Page 5 of 46 results (0.009 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

The IMAP Client for Outlook Express 6.00.2800.1106 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors. El cliente IMAP para Outlook Express 6.00.2800.1106 permite que servidores IMAP dañinos provoquen una denegación de servicio (caída) mediante ciertos valores literales muy grandes que provocan errores de desbordamiento de enteros. • http://marc.info/?l=bugtraq&m=105294024124163&w=2 •

CVSS: 5.0EPSS: 1%CPEs: 9EXPL: 0

The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors. El cliente IMAP para Sylpheed 0.8.11 permite que servidores IMAP remotos dañinos originen una denegación de servicio (caída) mediante ciertos tamaños literales muy largos que causan desbordamientos de búfer de enteros. • http://marc.info/?l=bugtraq&m=105294024124163&w=2 •

CVSS: 5.0EPSS: 4%CPEs: 4EXPL: 2

Buffer overflow in Microsoft Outlook Express 5.0, 5.5, and 6.0 allows remote attackers to cause a denial of service (crash) via a long <A HREF> link. • https://www.exploit-db.com/exploits/21789 http://archives.neohapsis.com/archives/bugtraq/2002-09/0082.html http://online.securityfocus.com/archive/1/291058 http://www.iss.net/security_center/static/10067.php http://www.securityfocus.com/bid/5682 •

CVSS: 3.8EPSS: 0%CPEs: 1EXPL: 2

Outlook Express 6.0 does not delete messages from dbx files, even when a user empties the Deleted items folder, which allows local users to read other users email. • http://www.iss.net/security_center/static/10500.php http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0210&L=ntbugtraq&F=P&S=&P=5732 •

CVSS: 7.5EPSS: 65%CPEs: 2EXPL: 1

Buffer overflow in the S/MIME Parsing capability in Microsoft Outlook Express 5.5 and 6.0 allows remote attackers to execute arbitrary code via a digitally signed email with a long "From" address, which triggers the overflow when the user views or previews the message. • https://www.exploit-db.com/exploits/21932 http://marc.info/?l=bugtraq&m=103435413105661&w=2 http://marc.info/?l=ntbugtraq&m=103429637822920&w=2 http://marc.info/?l=ntbugtraq&m=103429681123297&w=2 http://www.iss.net/security_center/static/10338.php http://www.securityfocus.com/bid/5944 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-058 •