3 results (0.015 seconds)

CVSS: 2.1EPSS: 0%CPEs: 44EXPL: 2

Rit Research Labs The Bat! 1.0.11 through 2.0 creates new accounts with insecure ACLs, which allows local users to read other users' email messages. • http://securitytracker.com/id?1008004 http://www.securityfocus.com/archive/1/342485 http://www.securityfocus.com/bid/8891 https://exchange.xforce.ibmcloud.com/vulnerabilities/13527 •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

Rit Research Labs The Bat! 1.51 for Windows allows a remote attacker to cause a denial of service by sending an email to a user's account containing a carriage return <CR> that is not followed by a line feed <LF>. • https://www.exploit-db.com/exploits/20783 http://archives.neohapsis.com/archives/bugtraq/2001-04/0345.html http://archives.neohapsis.com/archives/bugtraq/2001-04/0381.html http://archives.neohapsis.com/archives/bugtraq/2001-04/0410.html http://www.securityfocus.com/bid/2636 https://exchange.xforce.ibmcloud.com/vulnerabilities/6423 •

CVSS: 7.5EPSS: 0%CPEs: 40EXPL: 1

The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment's type with a different icon. • http://archives.neohapsis.com/archives/bugtraq/2001-04/0013.html http://www.securityfocus.com/bid/2530 •