Page 3 of 15 results (0.008 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000925 http://secunia.com/advisories/13830 http://security.gentoo.org/glsa/glsa-200501-35.xml http://securitytracker.com/id?1012981 http://www.debian.org/security/2005/dsa-673 http://www.mandriva.com/security/advisories?name=MDKSA-2005:024 http://www.redhat.com/support/errata/RHSA-2005-238.html http://www.redhat.com/support/errata/RHSA-2005-397.html http://www.securityfocus.com/bid/12354 https://exchange.xforce. • CWE-190: Integer Overflow or Wraparound •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 1

The camel component for Ximian Evolution 1.0.x and earlier does not verify certificates when it establishes a new SSL connection after previously verifying a certificate, which could allow remote attackers to monitor or modify sessions via a man-in-the-middle attack. El componente camel de Ximian Evolution 1.0.x y anteriores no verifica certificados cuando establece una conexión SSL nueva después de haberlo verificado anteriormente, lo que podría permitir a atacantes remotos monitorizar o modificar sesiones mediante un ataque de 'hombre en el medio' • http://archives.neohapsis.com/archives/bugtraq/2002-10/0045.html http://www.iss.net/security_center/static/10292.php http://www.securityfocus.com/bid/5875 •

CVSS: 5.0EPSS: 13%CPEs: 10EXPL: 2

The try_uudecoding function in mail-format.c for Ximian Evolution Mail User Agent 1.2.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malicious uuencoded (UUE) header, possibly triggering a heap-based buffer overflow. La función try_uudecoding en mail-format.c en Ximian Evolution Mail User Agent 1.2.2 y anteriores permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario mediante una cabecera "uu-codificada" (UUE) de manera maliciosa, posiblemente disparando un desbordamiento de búfer basado en el montón (heap). • https://www.exploit-db.com/exploits/22370 http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0141.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000648 http://marc.info/?l=bugtraq&m=104826470527308&w=2 http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10 http://www.gentoo.org/security/en/glsa/glsa-200303-18.xml http://www.mandriva.com/security/advisories?name=MDKSA-2003:045 http://www.redhat.com/support/errata/RHSA-2003-108.html http: •

CVSS: 5.0EPSS: 2%CPEs: 10EXPL: 2

The handle_image function in mail-format.c for Ximian Evolution Mail User Agent 1.2.2 and earlier does not properly escape HTML characters, which allows remote attackers to inject arbitrary data and HTML via a MIME Content-ID header in a MIME-encoded image. La función handle_image de mail-format.c en Ximian Evolution Mail User Agent 1.2.2 y anteriores no interpreta correctamente los caracteres 'escapados' de HTML, lo que permite a atacantes remotos la inyección arbitraria de datos y HTML mediante una cabecera MIME Content-ID en una imagen cifrada con MIME. • https://www.exploit-db.com/exploits/22371 http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0141.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000648 http://marc.info/?l=bugtraq&m=104826470527308&w=2 http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10 http://www.gentoo.org/security/en/glsa/glsa-200303-18.xml http://www.mandriva.com/security/advisories?name=MDKSA-2003:045 http://www.redhat.com/support/errata/RHSA-2003-108.html http: •

CVSS: 5.0EPSS: 5%CPEs: 10EXPL: 2

Ximian Evolution Mail User Agent 1.2.2 and earlier allows remote attackers to cause a denial of service (memory consumption) via a mail message that is uuencoded multiple times. Ximian Evolution Mail User Agent 1.2.2 y anteriores, permiten a atacantes remotos causar la Denegación de Servicios (por consumo de memoria) mediante un correo que se decodifica muchas veces. • https://www.exploit-db.com/exploits/22369 http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0141.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000648 http://marc.info/?l=bugtraq&m=104826470527308&w=2 http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10 http://www.gentoo.org/security/en/glsa/glsa-200303-18.xml http://www.mandriva.com/security/advisories?name=MDKSA-2003:045 http://www.redhat.com/support/errata/RHSA-2003-108.html http: •