1 results (0.006 seconds)

CVSS: 6.8EPSS: 20%CPEs: 1EXPL: 0

Format string vulnerability in the write_html function in calendar/gui/e-cal-component-memo-preview.c in Evolution Shared Memo 2.8.2.1, and possibly earlier versions, allows user-assisted remote attackers to execute arbitrary code via format specifiers in the categories of a crafted shared memo. Vulnerabilidad de cadena de formato en la función write_html en calendar/gui/e-cal-component-memo-preview.c de Evolution Shared Memo 2.8.2.1, y posiblemente versiones anteriores, permite a atacantes remotos con la intervención del usuario ejecutar código de su elección mediante especificadores de formato en las categorías de un memorándum compartido manipulado. • http://secunia.com/advisories/24234 http://secunia.com/advisories/24651 http://secunia.com/advisories/24668 http://secunia.com/advisories/25102 http://secunia.com/advisories/25551 http://secunia.com/advisories/25880 http://secunia.com/secunia_research/2007-44/advisory http://security.gentoo.org/glsa/glsa-200706-02.xml http://www.debian.org/security/2007/dsa-1325 http://www.mandriva.com/security/advisories?name=MDKSA-2007:070 http://www.novell.com/linux/security/advisories/ •