3 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 35EXPL: 0

Format string vulnerability in vsybase.c in vpopmail 5.4.2 and earlier has unknown impact and attack vectors. NOTE: in a followup post, it was observed that the source code used constants that, when compiled, became static format strings. Thus this is not a vulnerability • http://archives.neohapsis.com/archives/bugtraq/2004-08/0226.html http://archives.neohapsis.com/archives/bugtraq/2004-08/0264.html http://archives.neohapsis.com/archives/bugtraq/2004-08/0286.html http://www.osvdb.org/9147 http://www.securityfocus.com/bid/10962 https://exchange.xforce.ibmcloud.com/vulnerabilities/17017 •

CVSS: 7.5EPSS: 0%CPEs: 35EXPL: 0

Buffer overflow in vsybase.c in vpopmail 5.4.2 and earlier might allow attackers to cause a denial of service or execute arbitrary code. • http://archives.neohapsis.com/archives/bugtraq/2004-08/0226.html http://archives.neohapsis.com/archives/bugtraq/2004-08/0264.html http://archives.neohapsis.com/archives/bugtraq/2004-08/0286.html http://www.osvdb.org/9146 http://www.securityfocus.com/bid/10962 https://exchange.xforce.ibmcloud.com/vulnerabilities/17016 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

vchkpw program in vpopmail before version 4.8 does not properly cleanse an untrusted format string used in a call to syslog, which allows remote attackers to cause a denial of service via a USER or PASS command that contains arbitrary formatting directives. • http://www.securityfocus.com/bid/1418 http://www.securityfocus.com/templates/archive.pike?list=1&msg=395BD2A8.5D3396A7%40secureaustin.com http://www.vpopmail.cx/vpopmail-ChangeLog •