Page 5 of 28 results (0.007 seconds)

CVSS: 6.8EPSS: 3%CPEs: 1EXPL: 0

Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index. Camel (camel-imap-folder.c) en el componente de mensajería (mailer) para Evolution Data Server 1.11 permite a servidores IMAP remotos ejecutar código de su elección mediante un valor negativo de SEQUENCE en GData, lo cual se usa como índice de una rray. • ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc http://bugzilla.gnome.org/show_bug.cgi?id=447414 http://mail.gnome.org/archives/evolution-hackers/2007-June/msg00064.html http://osvdb.org/37489 http://secunia.com/advisories/25765 http://secunia.com/advisories/25766 http://secunia.com/advisories/25774 http://secunia.com/advisories/25777 http://secunia.com/advisories/25793 http://secunia.com/advisories/25798 http://secunia.com/advisories/25843 http:&# •

CVSS: 5.0EPSS: 5%CPEs: 1EXPL: 2

Evolution 2.8.1 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Evolution from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection. Evolution 2.8.1 y anteriores no utilizan adecuadamente el argumento --status-fd al invocar a GnuPG, lo cual provoca que Evolution no distinga visualmente entre trozos firmados y no firmados de mensajes OpenPGP con múltiples componentes, lo cual permite a atacantes remotos falsificar el contenido de un mensaje si ser detectado. • https://www.exploit-db.com/exploits/29691 http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html http://secunia.com/advisories/24412 http://securityreason.com/securityalert/2353 http://www.coresecurity.com/?action=item&id=1687 http://www.securityfocus.com/archive/1/461958/100/0/threaded http://www.securityfocus.com/archive/1/461958/30/7710/threaded http://www.securityfocus.com/bid/22760 http://www.securitytracker.com/id?1017727 http://www.vupen.com/english/ad •

CVSS: 2.6EPSS: 0%CPEs: 8EXPL: 0

Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used. • http://bugzilla.gnome.org/show_bug.cgi?id=309453 http://bugzilla.gnome.org/show_bug.cgi?id=311440 http://www.mandriva.com/security/advisories?name=MDKSA-2006:094 http://www.securityfocus.com/bid/18212 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

GNOME Evolution 2.4.2.1 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a text e-mail with a large number of URLs, possibly due to unknown problems in gtkhtml. • http://secunia.com/advisories/19094 http://www.securityfocus.com/archive/1/426452/100/0/threaded http://www.securityfocus.com/bid/16899 http://www.vupen.com/english/advisories/2006/0801 https://exchange.xforce.ibmcloud.com/vulnerabilities/25050 •

CVSS: 5.0EPSS: 17%CPEs: 8EXPL: 2

The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment. • https://www.exploit-db.com/exploits/27145 http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0925.html http://secunia.com/advisories/19504 http://securityreason.com/securityalert/610 http://www.mandriva.com/security/advisories?name=MDKSA-2006:057 http://www.novell.com/linux/security/advisories/2006_07_sr.html http://www.securityfocus.com/bid/16408 https://usn.ubuntu.com/265-1 •