Page 2 of 8 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Directory traversal vulnerability in Rit Research Labs The Bat! 1.48f and earlier allows a remote attacker to create arbitrary files via a "dot dot" attack in the filename for an attachment. • http://www.securityfocus.com/archive/1/154359 https://exchange.xforce.ibmcloud.com/vulnerabilities/5871 •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

Rit Research Labs The Bat! 1.51 for Windows allows a remote attacker to cause a denial of service by sending an email to a user's account containing a carriage return <CR> that is not followed by a line feed <LF>. • https://www.exploit-db.com/exploits/20783 http://archives.neohapsis.com/archives/bugtraq/2001-04/0345.html http://archives.neohapsis.com/archives/bugtraq/2001-04/0381.html http://archives.neohapsis.com/archives/bugtraq/2001-04/0410.html http://www.securityfocus.com/bid/2636 https://exchange.xforce.ibmcloud.com/vulnerabilities/6423 •

CVSS: 7.5EPSS: 0%CPEs: 40EXPL: 1

The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment's type with a different icon. • http://archives.neohapsis.com/archives/bugtraq/2001-04/0013.html http://www.securityfocus.com/bid/2530 •