Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
washington university vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2006-1394
Multiple cross-site scripting (XSS) vulnerabilities in the Microsoft IIS ISAPI filter (aka application server module) in University of Washington Pubcookie 3.1.0, 3.1.1, 3.2 prior to 3.2.1b, and 3.3 prior to 3.3.0a allow remote malicious users to inject arbitrary web script or HT...
University Of Washington Pubcookie 3.1.0
University Of Washington Pubcookie 3.1.1
University Of Washington Pubcookie 3.2.0
University Of Washington Pubcookie 3.2.1
University Of Washington Pubcookie 3.2.1a
University Of Washington Pubcookie 3.0.0
University Of Washington Pubcookie 3.3.0
320
VMScore
CVE-1999-1224
IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
University Of Washington Imapd
University Of Washington Imapd 4.1
215
VMScore
CVE-2003-0854
ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.
Washington University Wu-ftpd 2.4.2 Beta18
Washington University Wu-ftpd 2.4.2 Beta18 Vr10
Washington University Wu-ftpd 2.4.2 Beta18 Vr5
Washington University Wu-ftpd 2.4.2 Beta18 Vr6
Washington University Wu-ftpd 2.4.2 Beta18 Vr7
Washington University Wu-ftpd 2.6.0
Washington University Wu-ftpd 2.6.1
Gnu Fileutils 4.1.7
Washington University Wu-ftpd 2.4.1
Washington University Wu-ftpd 2.4.2 Beta18 Vr15
Washington University Wu-ftpd 2.4.2 Beta18 Vr4
Washington University Wu-ftpd 2.4.2 Vr17
Washington University Wu-ftpd 2.5.0
Gnu Fileutils 4.0
Gnu Fileutils 4.0.36
Washington University Wu-ftpd 2.4.2 Beta18 Vr11
Washington University Wu-ftpd 2.4.2 Beta18 Vr12
Washington University Wu-ftpd 2.4.2 Beta18 Vr8
Washington University Wu-ftpd 2.4.2 Beta18 Vr9
Washington University Wu-ftpd 2.6.2
Gnu Fileutils 4.1
Gnu Fileutils 4.1.6
1 EDB exploit
215
VMScore
CVE-2001-0736
Vulnerability in (1) pine prior to 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
Immunix Immunix 7.0 Beta
University Of Washington Pine
Immunix Immunix 6.2
Immunix Immunix 7.0
Redhat Linux 6.2
Redhat Linux 7.0
Engardelinux Secure Linux 1.0.1
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux 8.0
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Redhat Linux 5.2
1 EDB exploit
187
VMScore
CVE-2002-1782
The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
University Of Washington Uw-imap 2001.0a
187
VMScore
CVE-2000-1197
POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
University Of Washington Imap 4.5
107
VMScore
CVE-2005-1066
Race condition in rpdump in Pine 4.62 and previous versions allows local users to overwrite arbitrary files via a symlink attack.
University Of Washington Pine 4.62
NA
CVE-2009-0671
Rejected reason: Format string vulnerability in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit imap-2007d and other applications, allows remote malicious users to execute arbitrary code via format string specifiers in the initial request to the...
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6