Vulnerabilities (CVE)

Filtered by vendor Mgetty Project Subscribe
Filtered by product Mgetty
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-16742 1 Mgetty Project 1 Mgetty 2020-08-24 4.6 MEDIUM 7.8 HIGH
An issue was discovered in mgetty before 1.2.1. In contrib/scrts.c, a stack-based buffer overflow can be triggered via a command-line parameter.
CVE-2018-16743 1 Mgetty Project 1 Mgetty 2020-08-24 4.6 MEDIUM 7.8 HIGH
An issue was discovered in mgetty before 1.2.1. In contrib/next-login/login.c, the command-line parameter username is passed unsanitized to strcpy(), which can cause a stack-based buffer overflow.
CVE-2018-16741 2 Debian, Mgetty Project 2 Debian Linux, Mgetty 2019-10-03 7.2 HIGH 7.8 HIGH
An issue was discovered in mgetty before 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the ||, &&, or > characters within a file created by the "faxq-helper activate <jobid>" command.
CVE-2018-16744 1 Mgetty Project 1 Mgetty 2019-10-03 4.6 MEDIUM 7.8 HIGH
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.
CVE-2018-16745 1 Mgetty Project 1 Mgetty 2018-11-01 4.6 MEDIUM 7.8 HIGH
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.