Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
university of washington imapd vulnerabilities and exploits
(subscribe to this query)
3.6
CVSSv2
CVE-1999-1224
IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
University Of Washington Imapd
University Of Washington Imapd 4.1
4.6
CVSSv2
CVE-2001-0691
Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
University Of Washington Imapd 2000
University Of Washington Imapd 2000c
7.5
CVSSv2
CVE-2002-0379
Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and previous versions, allows remote authenticated users to execute arbitrary code via a long BODY reques...
University Of Washington Uw-imap 2000.287
University Of Washington Uw-imap 2000.315
University Of Washington Uw-imap 2000.283
University Of Washington Uw-imap 2000.284
2 EDB exploits
7.5
CVSSv2
CVE-2000-0284
Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
University Of Washington Imap 12.264
8 EDB exploits
7.5
CVSSv2
CVE-2005-0198
A logic error in the CRAM-MD5 code for the University of Washington IMAP (UW-IMAP) server, when Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, does not properly enforce all the required conditions for successful authentication, which allows remote mal...
University Of Washington Uw-imap
10
CVSSv2
CVE-1999-0042
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
University Of Washington Pop 3
University Of Washington Imap 4
Ibm Aix 4.2.1
Redhat Linux 2.0
Caldera Openlinux 1.0
Bsdi Bsd Os 3.0
Bsdi Bsd Os 2.1
Redhat Linux 4.0
1 EDB exploit
2.1
CVSSv2
CVE-2002-1782
The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
University Of Washington Uw-imap 2001.0a
10
CVSSv2
CVE-1999-0005
Arbitrary command execution via IMAP buffer overflow in authenticate command.
University Of Washington Imap 10.234
Netscape Messaging Server 3.55
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started