14 results (0.002 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 4

poppassd in Qualcomm qpopper 4.0.8 allows local users to modify arbitrary files and gain privileges via the -t (trace file) command line argument. • https://www.exploit-db.com/exploits/1230 https://www.exploit-db.com/exploits/1229 http://seclists.org/lists/fulldisclosure/2005/Sep/0652.html http://secunia.com/advisories/16935 http://www.securityfocus.com/bid/14944 http://www.vupen.com/english/advisories/2005/1844 •

CVSS: 3.6EPSS: 0%CPEs: 8EXPL: 4

Untrusted search path vulnerability in Qualcomm qpopper 4.0 through 4.05 allows local users to execute arbitrary code by modifying the PATH environment variable to reference a malicious smbpasswd program. • https://www.exploit-db.com/exploits/21 http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0047.html http://securityreason.com/securityalert/3268 http://www.securityfocus.com/archive/1/319811 http://www.securityfocus.com/bid/7447 https://exchange.xforce.ibmcloud.com/vulnerabilities/11877 • CWE-16: Configuration •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 2

The pop_msg function in qpopper 4.0.x before 4.0.5fc2 does not null terminate a message buffer after a call to Qvsnprintf, which could allow authenticated users to execute arbitrary code via a buffer overflow in a mdef command with a long macro name. La función pop_msg en qpopper 4.0.x antes de 4.0.5fc2 no termina en nulo un búfer de mensaje despues de una llamada a Qvsnprintf, lo que podría permitir a usuarios autenticados ejecutar código arbitrario mediante un desbordamiento de búfer en un comando mdef con un nombre de macro largo. • https://www.exploit-db.com/exploits/22342 http://marc.info/?l=bugtraq&m=104739841223916&w=2 http://marc.info/?l=bugtraq&m=104748775900481&w=2 http://marc.info/?l=bugtraq&m=104768137314397&w=2 http://marc.info/?l=bugtraq&m=104792541215354&w=2 http://www.debian.org/security/2003/dsa-259 http://www.novell.com/linux/security/advisories/2003_018_qpopper.html http://www.securityfocus.com/bid/7058 https://exchange.xforce.ibmcloud.com/vulnerabilities/11516 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in Qpopper (popper) 4.0.4 and earlier allows local users to cause a denial of service and possibly execute arbitrary code via a long bulldir argument in the user's .qpopper-options configuration file. • http://marc.info/?l=vuln-dev&m=102003707432457&w=2 http://online.securityfocus.com/archive/1/269969 http://www.iss.net/security_center/static/8949.php http://www.securityfocus.com/bid/4614 •

CVSS: 5.0EPSS: 3%CPEs: 4EXPL: 1

Qpopper (aka in.qpopper or popper) 4.0.3 and earlier allows remote attackers to cause a denial of service (CPU consumption) via a very large string, which causes an infinite loop. • https://www.exploit-db.com/exploits/21345 ftp://ftp.qualcomm.com/eudora/servers/unix/popper/qpopper4.0.4.tar.gz http://www.iss.net/security_center/static/8458.php http://www.securityfocus.com/archive/1/262213 http://www.securityfocus.com/bid/4295 •