Page 2 of 8 results (0.002 seconds)

CVSS: 5.1EPSS: 0%CPEs: 14EXPL: 0

Buffer overflow in Sylpheed before 1.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attachments with MIME-encoded file names. • http://sylpheed.good-day.net/changelog.html.en •

CVSS: 5.1EPSS: 5%CPEs: 27EXPL: 0

Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message. • http://secunia.com/advisories/14491 http://securitytracker.com/id?1013376 http://sylpheed.good-day.net/changelog-devel.html.en http://sylpheed.good-day.net/changelog.html.en http://www.gentoo.org/security/en/glsa/glsa-200503-26.xml http://www.redhat.com/support/errata/RHSA-2005-303.html https://access.redhat.com/security/cve/CVE-2005-0667 https://bugzilla.redhat.com/show_bug.cgi?id=1617556 •

CVSS: 5.0EPSS: 0%CPEs: 9EXPL: 0

The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors. El cliente IMAP para Sylpheed 0.8.11 permite que servidores IMAP remotos dañinos originen una denegación de servicio (caída) mediante ciertos tamaños literales muy largos que causan desbordamientos de búfer de enteros. • http://marc.info/?l=bugtraq&m=105294024124163&w=2 •