CVE-2002-0430 – Cobalt RaQ 2.0/3.0/4.0 XTR - 'MultiFileUpload.php' Authentication Bypass
https://notcve.org/view.php?id=CVE-2002-0430
MultiFileUploadHandler.php in the Sun Cobalt RaQ XTR administration interface allows local users to bypass authentication and overwrite arbitrary files via a symlink attack on a temporary file, followed by a request to MultiFileUpload.php. • https://www.exploit-db.com/exploits/21334 https://www.exploit-db.com/exploits/21335 http://archives.neohapsis.com/archives/bugtraq/2002-03/0081.html http://www.securityfocus.com/bid/4252 •
CVE-2002-0348
https://notcve.org/view.php?id=CVE-2002-0348
service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long service argument. • https://github.com/alt3kx/CVE-2002-0348 http://marc.info/?l=bugtraq&m=101495944202452&w=2 http://www.iss.net/security_center/static/8323.php http://www.securityfocus.com/bid/4209 •
CVE-2002-0346
https://notcve.org/view.php?id=CVE-2002-0346
Cross-site scripting vulnerability in Cobalt RAQ 4 allows remote attackers to execute arbitrary script as other Cobalt users via Javascript in a URL to (1) service.cgi or (2) alert.cgi. • https://github.com/alt3kx/CVE-2002-0346 http://marc.info/?l=bugtraq&m=101495944202452&w=2 http://www.iss.net/security_center/static/8321.php http://www.securityfocus.com/bid/4211 •
CVE-2002-0347
https://notcve.org/view.php?id=CVE-2002-0347
Directory traversal vulnerability in Cobalt RAQ 4 allows remote attackers to read password-protected files, and possibly files outside the web root, via a .. (dot dot) in an HTTP request. • https://github.com/alt3kx/CVE-2002-0347 http://marc.info/?l=bugtraq&m=101495944202452&w=2 http://www.iss.net/security_center/static/8322.php http://www.securityfocus.com/bid/4208 •
CVE-2000-0442 – Cobalt RaQ 2.0/3.0 / qpopper 2.52/2.53 - 'EUIDL' Format String Input
https://notcve.org/view.php?id=CVE-2000-0442
Qpopper 2.53 and earlier allows local users to gain privileges via a formatting string in the From: header, which is processed by the euidl command. • https://www.exploit-db.com/exploits/19955 http://archives.neohapsis.com/archives/bugtraq/2000-05/0267.html http://www.novell.com/linux/security/advisories/suse_security_announce_51.html http://www.securityfocus.com/bid/1242 •