Filtered by vendor University Of Washington
Subscriptions
Total
34 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2005-1066 | 1 University Of Washington | 1 Pine | 2025-04-03 | N/A |
| Race condition in rpdump in Pine 4.62 and earlier allows local users to overwrite arbitrary files via a symlink attack. | ||||
| CVE-2002-1903 | 1 University Of Washington | 1 Pine | 2025-04-03 | N/A |
| Pine 4.2.1 through 4.4.4 puts Unix usernames and/or uid into Sender: and X-Sender: headers, which could allow remote attackers to obtain sensitive information. | ||||
| CVE-2005-0198 | 2 Redhat, University Of Washington | 2 Enterprise Linux, Uw-imap | 2025-04-03 | N/A |
| A logic error in the CRAM-MD5 code for the University of Washington IMAP (UW-IMAP) server, when Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, does not properly enforce all the required conditions for successful authentication, which allows remote attackers to authenticate as arbitrary users. | ||||
| CVE-2000-0284 | 1 University Of Washington | 1 Imap | 2025-04-03 | N/A |
| Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands. | ||||
| CVE-2005-2933 | 2 Redhat, University Of Washington | 3 Enterprise Linux, Rhel Stronghold, Uw-imap | 2025-04-03 | N/A |
| Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely. | ||||
| CVE-2000-0909 | 1 University Of Washington | 1 Pine | 2025-04-03 | N/A |
| Buffer overflow in the automatic mail checking component of Pine 4.21 and earlier allows remote attackers to execute arbitrary commands via a long From: header. | ||||
| CVE-1999-0202 | 1 University Of Washington | 1 Wu-ftpd | 2025-04-03 | N/A |
| The GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands. | ||||
| CVE-1999-0920 | 1 University Of Washington | 2 Imap, Pop2d | 2025-04-03 | N/A |
| Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command. | ||||
| CVE-2006-1393 | 1 University Of Washington | 1 Pubcookie | 2025-04-03 | N/A |
| Multiple cross-site scripting (XSS) vulnerabilities in the mod_pubcookie Apache application server module in University of Washington Pubcookie 1.x, 3.0.0, 3.1.0, 3.1.1, 3.2 before 3.2.1b, and 3.3 before 3.3.0a allow remote attackers to inject arbitrary web script or HTML via unspecified attack vectors. | ||||
| CVE-2006-1394 | 1 University Of Washington | 1 Pubcookie | 2025-04-03 | N/A |
| Multiple cross-site scripting (XSS) vulnerabilities in the Microsoft IIS ISAPI filter (aka application server module) in University of Washington Pubcookie 3.1.0, 3.1.1, 3.2 before 3.2.1b, and 3.3 before 3.3.0a allow remote attackers to inject arbitrary web script or HTML via unspecified attack vectors. | ||||
| CVE-1999-0005 | 2 Netscape, University Of Washington | 2 Messaging Server, Imap | 2025-04-03 | N/A |
| Arbitrary command execution via IMAP buffer overflow in authenticate command. | ||||
| CVE-2002-0379 | 2 Redhat, University Of Washington | 2 Linux, Uw-imap | 2025-04-03 | N/A |
| Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request. | ||||
| CVE-1999-0042 | 5 Bsdi, Caldera, Ibm and 2 more | 6 Bsd Os, Openlinux, Aix and 3 more | 2025-04-03 | N/A |
| Buffer overflow in University of Washington's implementation of IMAP and POP servers. | ||||
| CVE-2000-0352 | 1 University Of Washington | 1 Pine | 2025-04-03 | N/A |
| Pine before version 4.21 does not properly filter shell metacharacters from URLs, which allows remote attackers to execute arbitrary commands via a malformed URL. | ||||