16 results (0.001 seconds)

CVSS: 10.0EPSS: 20%CPEs: 1EXPL: 1

23 Dec 2002 — overflow.cgi CGI script in Sun Cobalt RaQ 4 with the SHP (Security Hardening Patch) installed allows remote attackers to execute arbitrary code via a POST request with shell metacharacters in the email parameter. • https://www.exploit-db.com/exploits/22072 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

11 Dec 2002 — Directory traversal vulnerability in wget before 1.8.2-4 allows a remote FTP server to create or overwrite files as the wget user via filenames containing (1) /absolute/path or (2) .. (dot dot) sequences. Vulnerabilidad de atravesamiento de directorios en wget anteriores a 1.8.2-4 permite a servidores FTP remotos la creación o sobreescritura de ficheros como usuario wget mediante nombres de ficheros que contengan: direccionamiento absoluto secuencias .. (punto punto) • ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-003.0.txt •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 3

11 Jun 2002 — MultiFileUploadHandler.php in the Sun Cobalt RaQ XTR administration interface allows local users to bypass authentication and overwrite arbitrary files via a symlink attack on a temporary file, followed by a request to MultiFileUpload.php. • https://www.exploit-db.com/exploits/21334 •

CVSS: 7.5EPSS: 9%CPEs: 3EXPL: 1

03 May 2002 — Cross-site scripting vulnerability in Cobalt RAQ 4 allows remote attackers to execute arbitrary script as other Cobalt users via Javascript in a URL to (1) service.cgi or (2) alert.cgi. • https://github.com/alt3kx/CVE-2002-0346 •

CVSS: 7.5EPSS: 7%CPEs: 3EXPL: 1

03 May 2002 — Directory traversal vulnerability in Cobalt RAQ 4 allows remote attackers to read password-protected files, and possibly files outside the web root, via a .. (dot dot) in an HTTP request. • https://github.com/alt3kx/CVE-2002-0347 •

CVSS: 9.8EPSS: 5%CPEs: 3EXPL: 2

03 May 2002 — service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long service argument. • https://github.com/alt3kx/CVE-2002-0348 •

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 3

04 Jul 2001 — poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file. • https://www.exploit-db.com/exploits/20994 •

CVSS: 7.8EPSS: 4%CPEs: 4EXPL: 1

24 May 2000 — Qpopper 2.53 and earlier allows local users to gain privileges via a formatting string in the From: header, which is processed by the euidl command. • https://www.exploit-db.com/exploits/19955 •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

22 May 2000 — Cobalt RaQ2 and RaQ3 does not properly set the access permissions and ownership for files that are uploaded via FrontPage, which allows attackers to bypass cgiwrap and modify files. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0305.html •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

21 Apr 2000 — Qpopper 2.53 and 3.0 does not properly identify the \n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 1023 characters long and ends in \n. • http://www.securityfocus.com/bid/1133 •