This might be proprietary software.
|2020-01-24||CVE-2019-3697||UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of gnump3d in openSUSE Leap 15.1 allows local attackers to escalate from user gnump3d to root. This issue affects: openSUSE Leap 15.1 gnump3d version 3.0-lp151.2.1 and prior versions.||Gnump3d, Leap||7.8|
|2007-11-26||CVE-2007-6130||gnump3d 2.9final does not apply password protection to its plugins, which might allow remote attackers to bypass intended access restrictions.||Gnump3d||N/A|
|2005-11-01||CVE-2005-3425||Cross-site scripting (XSS) vulnerability in GNUMP3D before 2.9.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2005-3424.||Gnump3d||N/A|
|2005-11-01||CVE-2005-3424||Cross-site scripting (XSS) vulnerability in GNUMP3D before 2.9.5 allows remote attackers to inject arbitrary web script or HTML via 404 error pages, a different vulnerability than CVE-2005-3425.||Gnump3d||N/A|
|2005-11-18||CVE-2005-3355||Directory traversal vulnerability in GNU Gnump3d before 2.9.8 has unknown impact via "CGI parameters, and cookie values".||Gnump3d||N/A|
|2005-11-18||CVE-2005-3349||GNU Gnump3d before 2.9.8 allows local users to modify or delete arbitrary files via a symlink attack on the index.lok temporary file.||Gnump3d||N/A|
|2005-10-30||CVE-2005-3123||Directory traversal vulnerability in GNUMP3D before 2.9.6 allows remote attackers to read arbitrary files via crafted sequences such as "/.//..//////././", which is collapsed into "/.././" after ".." and "//" sequences are removed.||Gnump3d||N/A|