Page 3 of 29 results (0.002 seconds)

CVSS: 5.0EPSS: 5%CPEs: 1EXPL: 1

Buffer overflow in Eudora 5.2.1 allows remote attackers to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . (dot) characters. Desbordamiento de búfer en Eudora 5.2.1 permite que atacantes remotos causen una denegación de servicio (caída y reinicio fallido) y que posiblemente ejecuten código arbitrario mediante un argumento Attachment Converted con un elevado número de caracteres "." (punto). • https://www.exploit-db.com/exploits/23374 http://marc.info/?l=bugtraq&m=105370625529452&w=2 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 1

Qualcomm Eudora 5.2.1 allows remote attackers to read arbitrary files via an email message with a carriage return (CR) character in a spoofed "Attachment Converted:" string, which is not properly handled by Eudora. • https://www.exploit-db.com/exploits/19885 http://marc.info/?l=bugtraq&m=105362278914731&w=2 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The IMAP Client for Eudora 5.2.1 allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large literal size values that cause either integer signedness errors or integer overflow errors. El cliente IMAP para Eudora 5.2.1 permite que servidores IMAP dañinos provoquen una denegación de servicio y posiblemente ejecuten código arbitrario mediante ciertos valores literales muy grandes que provocan errores de desbordamiento de enteros. • http://marc.info/?l=bugtraq&m=105294024124163&w=2 •

CVSS: 5.0EPSS: 1%CPEs: 9EXPL: 0

The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors. El cliente IMAP para Sylpheed 0.8.11 permite que servidores IMAP remotos dañinos originen una denegación de servicio (caída) mediante ciertos tamaños literales muy largos que causan desbordamientos de búfer de enteros. • http://marc.info/?l=bugtraq&m=105294024124163&w=2 •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Eudora email client 5.1.1, with "use Microsoft viewer" enabled, allows remote attackers to execute arbitrary programs via an HTML email message containing a META refresh tag that references an embedded .mhtml file with ActiveX controls that execute a second embedded program, which is processed by Internet Explorer. • http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000644.html http://www.iss.net/security_center/static/9654.php •