Page 5 of 32 results (0.005 seconds)

CVSS: 5.0EPSS: 17%CPEs: 8EXPL: 2

The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment. • https://www.exploit-db.com/exploits/27145 http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0925.html http://secunia.com/advisories/19504 http://securityreason.com/securityalert/610 http://www.mandriva.com/security/advisories?name=MDKSA-2006:057 http://www.novell.com/linux/security/advisories/2006_07_sr.html http://www.securityfocus.com/bid/16408 https://usn.ubuntu.com/265-1 •

CVSS: 7.5EPSS: 7%CPEs: 10EXPL: 0

Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers. • http://marc.info/?l=full-disclosure&m=112368237712032&w=2 http://secunia.com/advisories/16394 http://secunia.com/advisories/19380 http://www.debian.org/security/2006/dsa-1016 http://www.mandriva.com/security/advisories?name=MDKSA-2005:141 http://www.novell.com/linux/security/advisories/2005_54_evolution.html http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html http://www.redhat.com/support/errata/RHSA-2005-267.html http://www.securityfocus.com/archive •

CVSS: 7.5EPSS: 8%CPEs: 11EXPL: 0

Format string vulnerability in Evolution 1.4 through 2.3.6.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the calendar entries such as task lists, which are not properly handled when the user selects the Calendars tab. • http://marc.info/?l=full-disclosure&m=112368237712032&w=2 http://secunia.com/advisories/16394 http://secunia.com/advisories/19380 http://www.debian.org/security/2006/dsa-1016 http://www.mandriva.com/security/advisories?name=MDKSA-2005:141 http://www.novell.com/linux/security/advisories/2005_54_evolution.html http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html http://www.redhat.com/support/errata/RHSA-2005-267.html http://www.securityfocus.com/archive •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Evolution 2.0.3 allows remote attackers to cause a denial of service (application crash or hang) via crafted messages, possibly involving charsets in attachment filenames. • http://bugzilla.ximian.com/show_bug.cgi?id=72609 http://www.mandriva.com/security/advisories?name=MDKSA-2005:059 http://www.redhat.com/support/errata/RHSA-2005-397.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10532 https://usn.ubuntu.com/166-1 https://access.redhat.com/security/cve/CVE-2005-0806 https://bugzilla.redhat.com/show_bug.cgi?id=1617583 •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000925 http://secunia.com/advisories/13830 http://security.gentoo.org/glsa/glsa-200501-35.xml http://securitytracker.com/id?1012981 http://www.debian.org/security/2005/dsa-673 http://www.mandriva.com/security/advisories?name=MDKSA-2005:024 http://www.redhat.com/support/errata/RHSA-2005-238.html http://www.redhat.com/support/errata/RHSA-2005-397.html http://www.securityfocus.com/bid/12354 https://exchange.xforce. • CWE-190: Integer Overflow or Wraparound •