4 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

qpopper 4.0.5 and earlier does not properly drop privileges before processing certain user-supplied files, which allows local users to overwrite or create arbitrary files as root. • http://bugs.gentoo.org/show_bug.cgi?id=90622 http://secunia.com/advisories/15475 http://secunia.com/advisories/15478 http://secunia.com/advisories/15505 http://www.debian.org/security/2005/dsa-728 http://www.gentoo.org/security/en/glsa/glsa-200505-17.xml •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

popauth.c in qpopper 4.0.5 and earlier does not properly set the umask, which may cause qpopper to create files with group or world-writable permissions. • http://bugs.gentoo.org/attachment.cgi?id=58329&action=view http://bugs.gentoo.org/show_bug.cgi?id=90622 http://secunia.com/advisories/15475 http://secunia.com/advisories/15478 http://secunia.com/advisories/15505 http://www.debian.org/security/2005/dsa-728 http://www.gentoo.org/security/en/glsa/glsa-200505-17.xml •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

popauth utility in Qualcomm Qpopper 4.0 and earlier allows local users to overwrite arbitrary files and execute commands as the pop user via a symlink attack on the -trace file option. • https://www.exploit-db.com/exploits/21185 http://www.securityfocus.com/archive/1/246069 https://exchange.xforce.ibmcloud.com/vulnerabilities/7707 •

CVSS: 10.0EPSS: 3%CPEs: 1EXPL: 2

Buffer overflow in POP servers based on BSD/Qualcomm's qpopper allows remote attackers to gain root access using a long PASS command. • https://www.exploit-db.com/exploits/19109 https://www.exploit-db.com/exploits/19110 ftp://patches.sgi.com/support/free/security/advisories/19980801-01-I http://www.securityfocus.com/bid/133 • CWE-125: Out-of-bounds Read •