Page 2 of 12 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Eudora 5.0.2 allows a remote attacker to read arbitrary files via an email with the path of the target file in the "Attachment Converted" MIME header, which sends the file when the email is forwarded to the attacker by the user. • http://www.osvdb.org/3085 http://www.securityfocus.com/archive/1/177369 http://www.securityfocus.com/bid/2616 https://exchange.xforce.ibmcloud.com/vulnerabilities/6431 •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 2

Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the 'Use Microsoft Viewer' and 'allow executables in HTML content' options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags. • https://www.exploit-db.com/exploits/20688 http://marc.info/?l=bugtraq&m=98503741910995&w=2 http://www.securityfocus.com/bid/2490 https://exchange.xforce.ibmcloud.com/vulnerabilities/6262 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

Eudora 5.1 allows remote attackers to execute arbitrary code when the "Use Microsoft Viewer" option is enabled and the "allow executables in HTML content" option is disabled, via an HTML email with a form that is activated from an image that the attacker spoofs as a link, which causes the user to execute the form and access embedded attachments. • https://www.exploit-db.com/exploits/20888 http://www.securityfocus.com/archive/1/187128 http://www.securityfocus.com/bid/2796 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Eudora mail client includes the absolute path of the sender's host within a virtual card (VCF). • http://www.osvdb.org/1545 http://www.securityfocus.com/archive/1/80888 http://www.securityfocus.com/bid/1653 https://exchange.xforce.ibmcloud.com/vulnerabilities/5206 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 5

Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment." • https://www.exploit-db.com/exploits/19885 https://www.exploit-db.com/exploits/22627 https://www.exploit-db.com/exploits/23398 https://www.exploit-db.com/exploits/23399 http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077 http://www.peacefire.org/security/stealthattach/explanation.html http://www.securityfocus.com/bid/1157 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •