3 results (0.005 seconds)

CVSS: 2.1EPSS: 0%CPEs: 44EXPL: 2

Rit Research Labs The Bat! 1.0.11 through 2.0 creates new accounts with insecure ACLs, which allows local users to read other users' email messages. • http://securitytracker.com/id?1008004 http://www.securityfocus.com/archive/1/342485 http://www.securityfocus.com/bid/8891 https://exchange.xforce.ibmcloud.com/vulnerabilities/13527 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 2

The Bat! 1.53d and 1.54beta, and possibly other versions, allows remote attackers to cause a denial of service (crash) via an attachment whose name includes an MS-DOS device name. • https://www.exploit-db.com/exploits/21307 http://marc.info/?l=bugtraq&m=101483832026841&w=2 http://www.iss.net/security_center/static/8303.php http://www.securityfocus.com/bid/4187 •

CVSS: 7.5EPSS: 0%CPEs: 40EXPL: 1

The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment's type with a different icon. • http://archives.neohapsis.com/archives/bugtraq/2001-04/0013.html http://www.securityfocus.com/bid/2530 •