Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Imap
(University_of_washington)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 7 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
1997-04-07 | CVE-1999-0042 | Buffer overflow in University of Washington's implementation of IMAP and POP servers. | Bsd_os, Openlinux, Aix, Linux, Imap, Pop | N/A | ||
2008-12-23 | CVE-2008-5514 | Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow. | Imap | N/A | ||
2001-08-31 | CVE-2000-1197 | POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes. | Imap | N/A | ||
2000-11-14 | CVE-2000-0847 | Buffer overflow in University of Washington c-client library (used by pine and other programs) allows remote attackers to execute arbitrary commands via a long X-Keywords header. | Imap, Pine | N/A | ||
2000-04-16 | CVE-2000-0284 | Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands. | Imap | N/A | ||
1999-05-26 | CVE-1999-0920 | Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command. | Imap, Pop2d | N/A | ||
1998-07-20 | CVE-1999-0005 | Arbitrary command execution via IMAP buffer overflow in authenticate command. | Messaging_server, Imap | N/A |