Page 2 of 10 results (0.007 seconds)

CVSS: 5.1EPSS: 0%CPEs: 25EXPL: 0

Stack-based buffer overflow in the ldif_get_line function in ldif.c of Sylpheed before 2.1.6 allows user-assisted attackers to execute arbitrary code by having local users import LDIF files with long lines. • http://osvdb.org/20675 http://secunia.com/advisories/17492 http://secunia.com/advisories/17525 http://secunia.com/advisories/17540 http://secunia.com/advisories/17678 http://secunia.com/advisories/17831 http://sylpheed.good-day.net/en/news.html http://www.debian.org/security/2005/dsa-906 http://www.gentoo.org/security/en/glsa/glsa-200511-13.xml http://www.novell.com/linux/security/advisories/2005_28_sr.html http://www.securityfocus.com/bid/15363 http://w • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.1EPSS: 0%CPEs: 14EXPL: 0

Buffer overflow in Sylpheed before 1.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attachments with MIME-encoded file names. • http://sylpheed.good-day.net/changelog.html.en •

CVSS: 5.1EPSS: 5%CPEs: 27EXPL: 0

Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message. • http://secunia.com/advisories/14491 http://securitytracker.com/id?1013376 http://sylpheed.good-day.net/changelog-devel.html.en http://sylpheed.good-day.net/changelog.html.en http://www.gentoo.org/security/en/glsa/glsa-200503-26.xml http://www.redhat.com/support/errata/RHSA-2005-303.html https://access.redhat.com/security/cve/CVE-2005-0667 https://bugzilla.redhat.com/show_bug.cgi?id=1617556 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

Format string vulnerability in send_message.c for Sylpheed-claws 0.9.4 through 0.9.6 allows remote SMTP servers to cause a denial of service (crash) in sylpheed via format strings in an error message. Vulnerabilidad de cadena de formato en send_message.c de Sylpheed-claws 0.9.4 a 0.9.6a permite a servidores SMTP remotos causar una denegación (caída) en sylpheed mediante cadenas de formato en un mensaje de error. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012542.html http://sylpheed.good-day.net/#changes http://www.guninski.com/sylph.html http://www.securityfocus.com/bid/8877 https://exchange.xforce.ibmcloud.com/vulnerabilities/13508 •

CVSS: 5.0EPSS: 1%CPEs: 9EXPL: 0

The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors. El cliente IMAP para Sylpheed 0.8.11 permite que servidores IMAP remotos dañinos originen una denegación de servicio (caída) mediante ciertos tamaños literales muy largos que causan desbordamientos de búfer de enteros. • http://marc.info/?l=bugtraq&m=105294024124163&w=2 •