Universityofwashington Universityofwashington

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Universityofwashington product.

RSS Feeds for Universityofwashington security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Universityofwashington products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Universityofwashington Sorted by Most Security Vulnerabilities since 2018

By the Year

In 2026 there have been 0 vulnerabilities in Universityofwashington.

Year Vulnerabilities Average Score
2026 0 0.00

It may take a day or so for new Universityofwashington vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Universityofwashington Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2008-5005 Nov 10, 2008
Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.
Alpine
Imap Toolkit
CVE-1999-0042 Apr 07, 1997
Buffer overflow in University of Washington's implementation of IMAP and POP servers. Buffer overflow in University of Washington's implementation of IMAP and POP servers.
Pop
Imap
CVE-1999-0202 Jan 01, 1997
The GNU tar command, when used in FTP sessions, may The GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands.
Wu Ftpd
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.