Page 5 of 29 results (0.002 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Eudora 5.0.2 allows a remote attacker to read arbitrary files via an email with the path of the target file in the "Attachment Converted" MIME header, which sends the file when the email is forwarded to the attacker by the user. • http://www.osvdb.org/3085 http://www.securityfocus.com/archive/1/177369 http://www.securityfocus.com/bid/2616 https://exchange.xforce.ibmcloud.com/vulnerabilities/6431 •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 0

Vulnerabilities in Qualcomm Eudora WorldMail Server may allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, as demonstrated by the PROTOS LDAPv3 test suite. • http://ciac.llnl.gov/ciac/bulletins/l-116.shtml http://www.cert.org/advisories/CA-2001-18.html http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/ldapv3 http://www.kb.cert.org/vuls/id/717380 http://www.kb.cert.org/vuls/id/JPLA-4WESNA http://www.securityfocus.com/bid/3043 •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 2

Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the 'Use Microsoft Viewer' and 'allow executables in HTML content' options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags. • https://www.exploit-db.com/exploits/20688 http://marc.info/?l=bugtraq&m=98503741910995&w=2 http://www.securityfocus.com/bid/2490 https://exchange.xforce.ibmcloud.com/vulnerabilities/6262 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

Eudora 5.1 allows remote attackers to execute arbitrary code when the "Use Microsoft Viewer" option is enabled and the "allow executables in HTML content" option is disabled, via an HTML email with a form that is activated from an image that the attacker spoofs as a link, which causes the user to execute the form and access embedded attachments. • https://www.exploit-db.com/exploits/20888 http://www.securityfocus.com/archive/1/187128 http://www.securityfocus.com/bid/2796 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Eudora mail client includes the absolute path of the sender's host within a virtual card (VCF). • http://www.osvdb.org/1545 http://www.securityfocus.com/archive/1/80888 http://www.securityfocus.com/bid/1653 https://exchange.xforce.ibmcloud.com/vulnerabilities/5206 •