7 results (0.006 seconds)

CVSS: 7.5EPSS: 29%CPEs: 1EXPL: 2

Buffer overflow in the IMAPd service in Qualcomm Eudora WorldMail 9.0.333.0 allows remote attackers to execute arbitrary code via a long string in a UID command. Desdbordamiento de buffer en el servicio IMAPd en Qualcomm Eudora WorldMail 9.0.333.0 permite a atacantes remotos ejecutar código arbitrario a través de una cadena larga en un comando UID. • https://www.exploit-db.com/exploits/31694 http://osvdb.org/show/osvdb/104071 http://www.exploit-db.com/exploits/31694 https://exchange.xforce.ibmcloud.com/vulnerabilities/91833 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

QUALCOMM Eudora WorldMail 4.0 allows remote attackers to cause a denial of service, as demonstrated by a certain module in VulnDisco Pack. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. As of 20061118, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. QUALCOMM Eudora WorldMail 4.0 permite a atacantes remotos provocar una denegación de servicio, como ha sido demostrado por cierto módulo en VulnDisco Pack. • http://secunia.com/advisories/22836 http://web.archive.org/web/20060502082622/www.gleg.net/vulndisco_pack_professional.shtml http://www.securityfocus.com/bid/21099 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Multiple buffer overflows in Eudora Worldmail, possibly Worldmail 3 version 6.1.22.0, have unknown impact and attack vectors, as demonstrated by the (1) "Eudora WorldMail stack overflow" and (2) "Eudora WorldMail heap overflow" modules in VulnDisco Pack. NOTE: Some of these details are obtained from third party information. As of 20061118, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. Múltiples desbordamientos de búfer en Eudora Worldmail, posiblemente Worldmail 3 versión 6.1.22.0, tiene impacto y vectores de ataque desconocidos, como ha sido demostrado por los módulos (1) "Eudora WorldMail stack overflow" and (2) "Eudora WorldMail heap overflow" en VulnDisco Pack. • http://secunia.com/advisories/22832 http://web.archive.org/web/20060502082657/http://www.gleg.net/vulndisco_pack_standard.shtml http://www.securityfocus.com/bid/21095 •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 1

Buffer overflow in cram.dll in QUALCOMM Eudora WorldMail 3.0 allows remote attackers to execute arbitrary code via an IMAP APPEND command with a long message literal argument, as demonstrated by Worldmail.pl. NOTE: this is a different vector and a different manipulation than CVE-2005-4267, so it might be a different vulnerability than CVE-2005-4267. • https://www.exploit-db.com/exploits/1380 http://www.securityfocus.com/archive/1/424157/100/0/threaded •

CVSS: 7.5EPSS: 96%CPEs: 1EXPL: 4

Stack-based buffer overflow in Qualcomm WorldMail 3.0 allows remote attackers to execute arbitrary code via a long IMAP command that ends with a "}" character, as demonstrated using long (1) LIST, (2) LSUB, (3) SEARCH TEXT, (4) STATUS INBOX, (5) AUTHENTICATE, (6) FETCH, (7) SELECT, and (8) COPY commands. • https://www.exploit-db.com/exploits/1380 https://www.exploit-db.com/exploits/16474 http://seclists.org/lists/fulldisclosure/2005/Dec/1037.html http://secunia.com/advisories/17640 http://securityreason.com/securityalert/277 http://securitytracker.com/id?1015391 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=359 http://www.securityfocus.com/bid/15980 http://www.vupen.com/english/advisories/2005/3005 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •