Filtered by vendor University Of Washington
Subscriptions
Total
34 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2008-5005 | 2 Redhat, University Of Washington | 3 Enterprise Linux, Alpine, Imap Toolkit | 2025-04-09 | N/A |
Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program. | ||||
CVE-2008-5006 | 1 University Of Washington | 1 Imap Toolkit | 2025-04-09 | N/A |
smtp.c in the c-client library in University of Washington IMAP Toolkit 2007b allows remote SMTP servers to cause a denial of service (NULL pointer dereference and application crash) by responding to the QUIT command with a close of the TCP connection instead of the expected 221 response code. | ||||
CVE-2008-5514 | 1 University Of Washington | 1 Imap | 2025-04-09 | N/A |
Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow. | ||||
CVE-1999-0202 | 1 University Of Washington | 1 Wu-ftpd | 2025-04-03 | N/A |
The GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands. | ||||
CVE-1999-0920 | 1 University Of Washington | 2 Imap, Pop2d | 2025-04-03 | N/A |
Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command. | ||||
CVE-1999-0997 | 3 Millenux Gmbh, Redhat, University Of Washington | 3 Anonftp, Linux, Wu-ftpd | 2025-04-03 | N/A |
wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress. | ||||
CVE-1999-1187 | 3 Freebsd, Slackware, University Of Washington | 3 Freebsd, Slackware Linux, Pine | 2025-04-03 | N/A |
Pine before version 3.94 allows local users to gain privileges via a symlink attack on a lockfile that is created when a user receives new mail. | ||||
CVE-1999-1224 | 1 University Of Washington | 1 Imapd | 2025-04-03 | N/A |
IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information. | ||||
CVE-2000-0284 | 1 University Of Washington | 1 Imap | 2025-04-03 | N/A |
Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands. | ||||
CVE-2000-0352 | 1 University Of Washington | 1 Pine | 2025-04-03 | N/A |
Pine before version 4.21 does not properly filter shell metacharacters from URLs, which allows remote attackers to execute arbitrary commands via a malformed URL. | ||||
CVE-2000-0353 | 1 University Of Washington | 1 Pine | 2025-04-03 | N/A |
Pine 4.x allows a remote attacker to execute arbitrary commands via an index.html file which executes lynx and obtains a uudecoded file from a malicious web server, which is then executed by Pine. | ||||
CVE-2000-0847 | 1 University Of Washington | 2 Imap, Pine | 2025-04-03 | N/A |
Buffer overflow in University of Washington c-client library (used by pine and other programs) allows remote attackers to execute arbitrary commands via a long X-Keywords header. | ||||
CVE-2000-0909 | 1 University Of Washington | 1 Pine | 2025-04-03 | N/A |
Buffer overflow in the automatic mail checking component of Pine 4.21 and earlier allows remote attackers to execute arbitrary commands via a long From: header. | ||||
CVE-2000-1197 | 1 University Of Washington | 1 Imap | 2025-04-03 | N/A |
POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes. | ||||
CVE-2001-0691 | 2 Redhat, University Of Washington | 2 Linux, Imapd | 2025-04-03 | N/A |
Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations. | ||||
CVE-2001-0736 | 5 Engardelinux, Immunix, Mandrakesoft and 2 more | 6 Secure Linux, Immunix, Mandrake Linux and 3 more | 2025-04-03 | N/A |
Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack. | ||||
CVE-2002-0014 | 2 Redhat, University Of Washington | 2 Linux, Pine | 2025-04-03 | N/A |
URL-handling code in Pine 4.43 and earlier allows remote attackers to execute arbitrary commands via a URL enclosed in single quotes and containing shell metacharacters (&). | ||||
CVE-1999-0004 | 3 Hp, Sco, University Of Washington | 3 Dtmail, Unixware, Pine | 2025-04-03 | N/A |
MIME buffer overflow in email clients, e.g. Solaris mailtool and Outlook. | ||||
CVE-2002-1320 | 2 Redhat, University Of Washington | 3 Enterprise Linux, Linux, Pine | 2025-04-03 | N/A |
Pine 4.44 and earlier allows remote attackers to cause a denial of service (core dump and failed restart) via an email message with a From header that contains a large number of quotation marks ("). | ||||
CVE-2002-1782 | 1 University Of Washington | 1 Uw-imap | 2025-04-03 | N/A |
The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user. |