Qualcomm

Qpopper

14 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.13%
  • Published 28.09.2005 23:03:00
  • Last modified 03.04.2025 01:03:51

poppassd in Qualcomm qpopper 4.0.8 allows local users to modify arbitrary files and gain privileges via the -t (trace file) command line argument.

Exploit
  • EPSS 0.15%
  • Published 31.12.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

Untrusted search path vulnerability in Qualcomm qpopper 4.0 through 4.05 allows local users to execute arbitrary code by modifying the PATH environment variable to reference a malicious smbpasswd program.

Exploit
  • EPSS 9.13%
  • Published 18.03.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

The pop_msg function in qpopper 4.0.x before 4.0.5fc2 does not null terminate a message buffer after a call to Qvsnprintf, which could allow authenticated users to execute arbitrary code via a buffer overflow in a mdef command with a long macro name.

  • EPSS 0.08%
  • Published 04.10.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in Qpopper (popper) 4.0.4 and earlier allows local users to cause a denial of service and possibly execute arbitrary code via a long bulldir argument in the user's .qpopper-options configuration file.

  • EPSS 5.48%
  • Published 12.08.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Qpopper (aka in.qpopper or popper) 4.0.3 and earlier allows remote attackers to cause a denial of service (CPU consumption) via a very large string, which causes an infinite loop.

  • EPSS 0.11%
  • Published 31.12.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

popauth utility in Qualcomm Qpopper 4.0 and earlier allows local users to overwrite arbitrary files and execute commands as the pop user via a symlink attack on the -trace file option.

  • EPSS 0.26%
  • Published 31.08.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

qpopper POP server creates lock files with predictable names, which allows local users to cause a denial of service for other users (lack of mail access) by creating lock files for other mail boxes.

Exploit
  • EPSS 1.23%
  • Published 31.08.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

qpopper 4.01 with PAM based authentication on Red Hat systems generates different error messages when an invalid username is provided instead of a valid name, which allows remote attackers to determine valid usernames on the system.

  • EPSS 0.96%
  • Published 02.06.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in qpopper (aka qpop or popper) 4.0 through 4.0.2 allows remote attackers to gain privileges via a long username.

  • EPSS 3.99%
  • Published 24.05.2000 04:00:00
  • Last modified 03.04.2025 01:03:51

Qpopper 2.53 and earlier allows local users to gain privileges via a formatting string in the From: header, which is processed by the euidl command.