Page 7 of 36 results (0.008 seconds)

CVSS: 5.0EPSS: 1%CPEs: 9EXPL: 0

The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors. El cliente IMAP para Sylpheed 0.8.11 permite que servidores IMAP remotos dañinos originen una denegación de servicio (caída) mediante ciertos tamaños literales muy largos que causan desbordamientos de búfer de enteros. • http://marc.info/?l=bugtraq&m=105294024124163&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Multiple off-by-one buffer overflows in the IMAP capability for Mutt 1.3.28 and earlier, and Balsa 1.2.4 and earlier, allow a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a specially crafted mail folder, a different vulnerability than CVE-2003-0140. • http://www.debian.org/security/2003/dsa-274 http://www.debian.org/security/2003/dsa-300 http://www.securityfocus.com/bid/7229 •

CVSS: 7.5EPSS: 3%CPEs: 9EXPL: 0

Buffer overflow in Mutt 1.4.0 and possibly earlier versions, 1.5.x up to 1.5.3, and other programs that use Mutt code such as Balsa before 2.0.10, allows a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a crafted folder. Desbordamiento de búfer en Mutt 1.4.0 y posiblemente versiones anteriores, y 1.5.x hasta 1.5.3 permite a un servidor IMAP remoto malicioso causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario mediante una carpeta especialmente hecha. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000630 http://marc.info/?l=bugtraq&m=104817995421439&w=2 http://marc.info/?l=bugtraq&m=104818814931378&w=2 http://marc.info/? •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Vulnerability in RFC822 address parser in mutt before 1.2.5.1 and mutt 1.3.x before 1.3.25 allows remote attackers to execute arbitrary commands via an improperly terminated comment or phrase in the address list. Vulnerabilidad en el analizador de direcciones RFC822 de mutt (versiones 1.2.5.1 y anteriores y 1.3.x hasta la 1.3.35), permite que atacantes remotos puedan ejecutar comandos arbitrarios por medio de un comentario o frase mal terminado en la lista de direcciones. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-002.0.txt ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:04.mutt.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000449 http://marc.info/?l=bugtraq&m=100994648918287&w=2 http://online.securityfocus.com/advisories/3778 http://www.debian.org/security/2002/dsa-096 http://www.iss.net/security_center/static/7759.php http://www.mutt.org/announce/mutt-1.2.5.1-1.3.25.html http: •

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

Format string vulnerability in Mutt before 1.2.5 allows a remote malicious IMAP server to execute arbitrary commands. • http://archives.neohapsis.com/archives/bugtraq/2001-03/0246.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000385 http://marc.info/?l=bugtraq&m=98473109630421&w=2 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-031.php3 http://www.osvdb.org/5615 http://www.redhat.com/support/errata/RHSA-2001-029.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6235 •