
CVE-2005-1151
https://notcve.org/view.php?id=CVE-2005-1151
25 May 2005 — qpopper 4.0.5 and earlier does not properly drop privileges before processing certain user-supplied files, which allows local users to overwrite or create arbitrary files as root. • http://bugs.gentoo.org/show_bug.cgi?id=90622 •

CVE-2005-1152
https://notcve.org/view.php?id=CVE-2005-1152
25 May 2005 — popauth.c in qpopper 4.0.5 and earlier does not properly set the umask, which may cause qpopper to create files with group or world-writable permissions. • http://bugs.gentoo.org/attachment.cgi?id=58329&action=view •

CVE-2001-1487 – QPopper 4.0.x - PopAuth Trace File Shell Command Execution
https://notcve.org/view.php?id=CVE-2001-1487
31 Dec 2001 — popauth utility in Qualcomm Qpopper 4.0 and earlier allows local users to overwrite arbitrary files and execute commands as the pop user via a symlink attack on the -trace file option. • https://www.exploit-db.com/exploits/21185 •

CVE-2000-1198 – Qualcomm qpopper 2.53/3.0 / RedHat imap 4.5 -4 / UoW imap 4.5 popd - Lock File Denial of Service
https://notcve.org/view.php?id=CVE-2000-1198
31 Aug 2001 — qpopper POP server creates lock files with predictable names, which allows local users to cause a denial of service for other users (lack of mail access) by creating lock files for other mail boxes. • https://www.exploit-db.com/exploits/19869 • CWE-667: Improper Locking •

CVE-2000-0442 – Cobalt RaQ 2.0/3.0 / qpopper 2.52/2.53 - 'EUIDL' Format String Input
https://notcve.org/view.php?id=CVE-2000-0442
24 May 2000 — Qpopper 2.53 and earlier allows local users to gain privileges via a formatting string in the From: header, which is processed by the euidl command. • https://www.exploit-db.com/exploits/19955 •

CVE-2000-0320
https://notcve.org/view.php?id=CVE-2000-0320
21 Apr 2000 — Qpopper 2.53 and 3.0 does not properly identify the \n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 1023 characters long and ends in \n. • http://www.securityfocus.com/bid/1133 •