VYPR
Vendor

Ncsa

Products
6
CVEs
8
Across products
9
Status
Private

Products

6

Recent CVEs

8
  • CVE-2005-0468May 2, 2005
    risk 0.08cvss epss 0.59

    Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.

  • CVE-1999-0067Mar 20, 1996
    risk 0.07cvss epss 0.86

    phf CGI program allows remote command execution through shell metacharacters.

  • CVE-2005-0469May 2, 2005
    risk 0.04cvss epss 0.48

    Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

  • CVE-1999-0267Sep 23, 1997
    risk 0.04cvss epss 0.06

    Buffer overflow in NCSA HTTP daemon v1.3 allows remote command execution.

  • CVE-1999-0146Jul 15, 1997
    risk 0.04cvss epss 0.13

    The campas CGI program provided with some NCSA web servers allows an attacker to execute arbitrary commands via encoded carriage return characters in the query string, as demonstrated by reading the password file.

  • CVE-1999-0235Feb 17, 1995
    risk 0.03cvss epss 0.03

    Buffer overflow in NCSA WebServer (1.4.1 and below) gives remote access.

  • CVE-2011-0738Feb 2, 2011
    risk 0.00cvss epss 0.01

    MyProxy 5.0 through 5.2, as used in Globus Toolkit 5.0.0 through 5.0.2, does not properly verify the (1) hostname or (2) identity in the X.509 certificate for the myproxy-server, which allows remote attackers to spoof the server and conduct man-in-the-middle (MITM) attacks via a crafted certificate when executing (a) myproxy-logon or (b) myproxy-get-delegation.

  • CVE-1999-1090Sep 10, 1991
    risk 0.00cvss epss 0.01

    The default configuration of NCSA Telnet package for Macintosh and PC enables FTP, even though it does not include an "ftp=yes" line, which allows remote attackers to read and modify arbitrary files.