3 results (0.003 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

Multiple stack-based buffer overflows in University of Minnesota gopher client 3.0.9 allow remote malicious servers to execute arbitrary code via (1) a long "+VIEWS:" reply, which is not properly handled in the VIfromLine function, and (2) certain arguments when launching third party programs such as a web browser from a web link, which is not properly handled in the FIOgetargv function. • https://www.exploit-db.com/exploits/1187 http://marc.info/?l=bugtraq&m=112559902931614&w=2 http://secunia.com/advisories/16614 http://secunia.com/advisories/17016 http://www.debian.org/security/2005/dsa-832 http://www.kb.cert.org/vuls/id/619812 http://www.securityfocus.com/bid/14693 https://exchange.xforce.ibmcloud.com/vulnerabilities/22053 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

gopher.c in the Gopher client 3.0.5 does not properly create temporary files, which allows local users to gain privileges. gopher.c en el cliente Gopher 3.0.5 no crea adecuadamente los ficheros temporales, lo que permite que usuarios locales ganen privilegios. • http://www.debian.org/security/2005/dsa-770 http://www.securitytracker.com/alerts/2005/Jul/1014599.html •

CVSS: 7.5EPSS: 58%CPEs: 12EXPL: 1

Buffer overflow in gopher client for Microsoft Internet Explorer 5.1 through 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote attackers to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server that sends a long response. Desbordamiento de búfer en el cliente gopher de Microsoft Internet Explorer 5.1 a la 6.0, Proxy Server 2.0, o ISA Server 2000 permite a atacantes remotos la ejecución de código arbitrario mediante una URL gopher:// que redirige al usuario a un servidor gopher real o simulado que envía una respuesta larga. • https://www.exploit-db.com/exploits/21510 http://marc.info/?l=bugtraq&m=102320516707940&w=2 http://marc.info/?l=bugtraq&m=102397955217618&w=2 http://online.securityfocus.com/archive/1/276848 http://www.iss.net/security_center/static/9247.php http://www.kb.cert.org/vuls/id/440275 http://www.pivx.com/workaround_fail.html http://www.securityfocus.com/bid/4930 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-027 https://oval.cisecurity •