3 results (0.004 seconds)

CVSS: 9.8EPSS: 24%CPEs: 1EXPL: 2

02 Sep 2005 — Multiple stack-based buffer overflows in University of Minnesota gopher client 3.0.9 allow remote malicious servers to execute arbitrary code via (1) a long "+VIEWS:" reply, which is not properly handled in the VIfromLine function, and (2) certain arguments when launching third party programs such as a web browser from a web link, which is not properly handled in the FIOgetargv function. • https://www.exploit-db.com/exploits/1187 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

03 Aug 2005 — gopher.c in the Gopher client 3.0.5 does not properly create temporary files, which allows local users to gain privileges. gopher.c en el cliente Gopher 3.0.5 no crea adecuadamente los ficheros temporales, lo que permite que usuarios locales ganen privilegios. • http://www.debian.org/security/2005/dsa-770 •

CVSS: 9.8EPSS: 65%CPEs: 12EXPL: 1

15 Jun 2002 — Buffer overflow in gopher client for Microsoft Internet Explorer 5.1 through 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote attackers to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server that sends a long response. Desbordamiento de búfer en el cliente gopher de Microsoft Internet Explorer 5.1 a la 6.0, Proxy Server 2.0, o ISA Server 2000 permite a atacantes remotos la ejecución de código arbitrario mediante una URL gopher:// que redirige al usu... • https://www.exploit-db.com/exploits/21510 •