Page 3 of 14 results (0.010 seconds)

CVSS: 2.6EPSS: 0%CPEs: 8EXPL: 0

Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used. • http://bugzilla.gnome.org/show_bug.cgi?id=309453 http://bugzilla.gnome.org/show_bug.cgi?id=311440 http://www.mandriva.com/security/advisories?name=MDKSA-2006:094 http://www.securityfocus.com/bid/18212 •

CVSS: 5.0EPSS: 17%CPEs: 8EXPL: 2

The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment. • https://www.exploit-db.com/exploits/27145 http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0925.html http://secunia.com/advisories/19504 http://securityreason.com/securityalert/610 http://www.mandriva.com/security/advisories?name=MDKSA-2006:057 http://www.novell.com/linux/security/advisories/2006_07_sr.html http://www.securityfocus.com/bid/16408 https://usn.ubuntu.com/265-1 •

CVSS: 7.5EPSS: 7%CPEs: 10EXPL: 0

Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers. • http://marc.info/?l=full-disclosure&m=112368237712032&w=2 http://secunia.com/advisories/16394 http://secunia.com/advisories/19380 http://www.debian.org/security/2006/dsa-1016 http://www.mandriva.com/security/advisories?name=MDKSA-2005:141 http://www.novell.com/linux/security/advisories/2005_54_evolution.html http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html http://www.redhat.com/support/errata/RHSA-2005-267.html http://www.securityfocus.com/archive •

CVSS: 7.5EPSS: 8%CPEs: 11EXPL: 0

Format string vulnerability in Evolution 1.4 through 2.3.6.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the calendar entries such as task lists, which are not properly handled when the user selects the Calendars tab. • http://marc.info/?l=full-disclosure&m=112368237712032&w=2 http://secunia.com/advisories/16394 http://secunia.com/advisories/19380 http://www.debian.org/security/2006/dsa-1016 http://www.mandriva.com/security/advisories?name=MDKSA-2005:141 http://www.novell.com/linux/security/advisories/2005_54_evolution.html http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html http://www.redhat.com/support/errata/RHSA-2005-267.html http://www.securityfocus.com/archive •