Filtered by vendor University Of Washington
Subscriptions
Total
34 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2002-1903 | 1 University Of Washington | 1 Pine | 2024-09-16 | N/A |
Pine 4.2.1 through 4.4.4 puts Unix usernames and/or uid into Sender: and X-Sender: headers, which could allow remote attackers to obtain sensitive information. | ||||
CVE-2002-2325 | 1 University Of Washington | 1 Pine | 2024-09-16 | N/A |
The c-client library in Internet Message Access Protocol (IMAP) dated before 2002 RC2, as used by Pine 4.20 through 4.44, allows remote attackers to cause a denial of service (client crash) via a MIME-encoded email with Content-Type header containing an empty boundary field. | ||||
CVE-2000-1197 | 1 University Of Washington | 1 Imap | 2024-08-08 | N/A |
POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes. | ||||
CVE-2000-0909 | 1 University Of Washington | 1 Pine | 2024-08-08 | N/A |
Buffer overflow in the automatic mail checking component of Pine 4.21 and earlier allows remote attackers to execute arbitrary commands via a long From: header. | ||||
CVE-2000-0847 | 1 University Of Washington | 2 Imap, Pine | 2024-08-08 | N/A |
Buffer overflow in University of Washington c-client library (used by pine and other programs) allows remote attackers to execute arbitrary commands via a long X-Keywords header. | ||||
CVE-2000-0353 | 1 University Of Washington | 1 Pine | 2024-08-08 | N/A |
Pine 4.x allows a remote attacker to execute arbitrary commands via an index.html file which executes lynx and obtains a uudecoded file from a malicious web server, which is then executed by Pine. | ||||
CVE-2000-0352 | 1 University Of Washington | 1 Pine | 2024-08-08 | N/A |
Pine before version 4.21 does not properly filter shell metacharacters from URLs, which allows remote attackers to execute arbitrary commands via a malformed URL. | ||||
CVE-2000-0284 | 1 University Of Washington | 1 Imap | 2024-08-08 | N/A |
Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands. | ||||
CVE-2001-0691 | 2 Redhat, University Of Washington | 2 Linux, Imapd | 2024-08-08 | N/A |
Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations. | ||||
CVE-2001-0736 | 5 Engardelinux, Immunix, Mandrakesoft and 2 more | 6 Secure Linux, Immunix, Mandrake Linux and 3 more | 2024-08-08 | N/A |
Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack. | ||||
CVE-2002-1782 | 1 University Of Washington | 1 Uw-imap | 2024-08-08 | N/A |
The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user. | ||||
CVE-2002-1320 | 2 Redhat, University Of Washington | 3 Enterprise Linux, Linux, Pine | 2024-08-08 | N/A |
Pine 4.44 and earlier allows remote attackers to cause a denial of service (core dump and failed restart) via an email message with a From header that contains a large number of quotation marks ("). | ||||
CVE-2002-0379 | 2 Redhat, University Of Washington | 2 Linux, Uw-imap | 2024-08-08 | N/A |
Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request. | ||||
CVE-2002-0014 | 2 Redhat, University Of Washington | 2 Linux, Pine | 2024-08-08 | N/A |
URL-handling code in Pine 4.43 and earlier allows remote attackers to execute arbitrary commands via a URL enclosed in single quotes and containing shell metacharacters (&). | ||||
CVE-2003-0720 | 2 Redhat, University Of Washington | 3 Enterprise Linux, Linux, Pine | 2024-08-08 | N/A |
Buffer overflow in PINE before 4.58 allows remote attackers to execute arbitrary code via a malformed message/external-body MIME type. | ||||
CVE-2003-0297 | 2 Redhat, University Of Washington | 4 Enterprise Linux, C-client, Imap-2002b and 1 more | 2024-08-08 | N/A |
c-client IMAP Client, as used in imap-2002b and Pine 4.53, allows remote malicious IMAP servers to cause a denial of service (crash) and possibly execute arbitrary code via certain large (1) literal and (2) mailbox size values that cause either integer signedness errors or integer overflow errors. | ||||
CVE-2003-0300 | 8 Microsoft, Mozilla, Mutt and 5 more | 8 Outlook Express, Mozilla, Mutt and 5 more | 2024-08-08 | N/A |
The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors. | ||||
CVE-2005-2933 | 2 Redhat, University Of Washington | 3 Enterprise Linux, Rhel Stronghold, Uw-imap | 2024-08-07 | N/A |
Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely. | ||||
CVE-2005-1066 | 1 University Of Washington | 1 Pine | 2024-08-07 | N/A |
Race condition in rpdump in Pine 4.62 and earlier allows local users to overwrite arbitrary files via a symlink attack. | ||||
CVE-2005-0198 | 2 Redhat, University Of Washington | 2 Enterprise Linux, Uw-imap | 2024-08-07 | N/A |
A logic error in the CRAM-MD5 code for the University of Washington IMAP (UW-IMAP) server, when Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, does not properly enforce all the required conditions for successful authentication, which allows remote attackers to authenticate as arbitrary users. |