3 results (0.003 seconds)

CVSS: 7.5EPSS: 15%CPEs: 12EXPL: 0

Heap-based buffer overflow in Borland idsql32.dll 5.1.0.4, as used by RevilloC MailServer; 5.2.0.2 as used by Borland Developer Studio 2006; and possibly other versions allows remote attackers to execute arbitrary code via a long SQL statement, related to use of the DbiQExec function. Desbordamiento del buffer basado en pilas en el Borland idsql32.dll 5.1.0.4, como el usado en el RevilloC MailServer, la 5.2.0.2 como el usado en el Developer Studio 2006 y posiblemente otras versiones, permite a atacantes remotos ejecutar código de su elección a través de la declaración de una sentencia larga en SQL relacionada con el uso de la función DbiQExec. • http://secunia.com/advisories/22570 http://secunia.com/secunia_research/2006-70/advisory http://www.securityfocus.com/archive/1/453003/100/0/threaded http://www.securityfocus.com/bid/21342 http://www.vupen.com/english/advisories/2006/4763 https://exchange.xforce.ibmcloud.com/vulnerabilities/30583 •

CVSS: 7.5EPSS: 19%CPEs: 1EXPL: 2

Multiple heap-based buffer overflows in RevilloC MailServer 1.21 and earlier allow remote attackers to cause a denial of service (CPU consumption or application crash) or execute arbitrary code via a long argument to the (1) MAIL FROM or (2) RCPT TO command. Múltiples desbordamientos de búfer basado en montón en RevilloC MailServer 1.21 y anteriores permite a atacantes remotos provocar una denegación de servicio (agotamiento de CPU o caída de aplicación) o ejecutar código de su elección mediante un argumento long los comandos (1) MAIL FROM o (2) RCPT TO. • https://www.exploit-db.com/exploits/2650 http://secunia.com/advisories/22559 http://www.securityfocus.com/bid/20709 http://www.vupen.com/english/advisories/2006/4181 https://exchange.xforce.ibmcloud.com/vulnerabilities/29803 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 26%CPEs: 2EXPL: 6

Buffer overflow in RevilloC MailServer and Proxy 1.21 allows remote attackers to execute arbitrary code via a long USER command. • https://www.exploit-db.com/exploits/1565 http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0910.html http://secunia.com/advisories/19119 http://securitytracker.com/id?1015739 http://www.morx.org/rev.txt http://www.osvdb.org/23735 http://www.securityfocus.com/archive/1/427192/100/0/threaded http://www.securityfocus.com/bid/16997 http://www.vupen.com/english/advisories/2006/0867 https://exchange.xforce.ibmcloud.com/vulnerabilities/25072 •