Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown
CVE-2009-0688
Disclosure Date: May 15, 2009 (last updated October 04, 2023)
Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
0
Attacker Value
Unknown
CVE-2006-0250
Disclosure Date: January 18, 2006 (last updated February 22, 2025)
Format string vulnerability in the snmp_input function in snmptrapd in CMU SNMP utilities (cmu-snmp) allows remote attackers to execute arbitrary code by sending crafted SNMP messages to UDP port 162.
0
Attacker Value
Unknown
CVE-2004-1012
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption.
0
Attacker Value
Unknown
CVE-2004-1013
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.
0
Attacker Value
Unknown
CVE-2004-1015
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.
0
Attacker Value
Unknown
CVE-2004-1011
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.
0
Attacker Value
Unknown
CVE-2004-1067
Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.
0
Attacker Value
Unknown
CVE-2002-1580
Disclosure Date: June 14, 2004 (last updated February 22, 2025)
Integer overflow in imapparse.c for Cyrus IMAP server 1.4 and 2.1.10 allows remote attackers to execute arbitrary code via a large length value that facilitates a buffer overflow attack, a different vulnerability than CVE-2002-1347.
0
Attacker Value
Unknown
CVE-2001-1154
Disclosure Date: August 30, 2001 (last updated February 22, 2025)
Cyrus 2.0.15, 2.0.16, and 1.6.24 on BSDi 4.2, with IMAP enabled, allows remote attackers to cause a denial of service (hang) using PHP IMAP clients.
0
Attacker Value
Unknown
CVE-2000-0956
Disclosure Date: December 19, 2000 (last updated February 22, 2025)
cyrus-sasl before 1.5.24 in Red Hat Linux 7.0 does not properly verify the authorization for a local user, which could allow the users to bypass specified access restrictions.
0