Page 7 of 39 results (0.010 seconds)

CVSS: 7.5EPSS: 19%CPEs: 1EXPL: 5

Buffer overflow in the mutt_decode_xbit function in Handler.c for Mutt 1.5.10 allows remote attackers to execute arbitrary code, possibly due to interactions with libiconv or gettext. • http://comments.gmane.org/gmane.mail.mutt.devel/8379 http://online.securityfocus.com/archive/1/408493 http://online.securityfocus.com/archive/1/408501 http://secunia.com/advisories/16485 http://securitytracker.com/id?1014729 http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2005-08/0594.html http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2005-08/0600.html http://www.securityfocus.com/bid/14596 •

CVSS: 7.5EPSS: 8%CPEs: 18EXPL: 0

Buffer overflow in the index menu code (menu_pad_string of menu.c) for Mutt 1.4.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain mail messages. Desbordamiento de búfer en el código del menú de índice (menu_pad_string de menu.c) de Mutt 1.4.1 y anteriores permite a atacantes remotos causar una denegación de servició (caída) y posiblemente ejecutar código arbitrario mediante ciertos mensajes de correo. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-013.0.txt http://bugs.debian.org/126336 http://marc.info/?l=bugtraq&m=107651677817933&w=2 http://marc.info/?l=bugtraq&m=107696262905039&w=2 http://marc.info/?l=bugtraq&m=107884956930903&w=2 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:010 http://www.osvdb.org/3918 http://www.redhat.com/support/errata/RHSA-2004-050.html http://www.redhat.com/support/errata/RHSA-2004-051.html http:/ •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

The IMAP Client, as used in mutt 1.4.1 and Balsa 2.0.10, allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large mailbox size values that cause either integer signedness errors or integer overflow errors. El cliente IMAP, usado en mutt 1.4.1 y Balsa 2.0.10, permite que servidores IMAP remotos dañinos provoquen una denegación de servicio y posiblemente ejecuten código arbitrario mediante ciertos valores de tamaño para mailbox muy grandes (lo que origina un desbordamiento de búfer de enteros). • http://marc.info/?l=bugtraq&m=105294024124163&w=2 •

CVSS: 5.0EPSS: 1%CPEs: 9EXPL: 0

The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors. El cliente IMAP para Sylpheed 0.8.11 permite que servidores IMAP remotos dañinos originen una denegación de servicio (caída) mediante ciertos tamaños literales muy largos que causan desbordamientos de búfer de enteros. • http://marc.info/?l=bugtraq&m=105294024124163&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Multiple off-by-one buffer overflows in the IMAP capability for Mutt 1.3.28 and earlier, and Balsa 1.2.4 and earlier, allow a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a specially crafted mail folder, a different vulnerability than CVE-2003-0140. • http://www.debian.org/security/2003/dsa-274 http://www.debian.org/security/2003/dsa-300 http://www.securityfocus.com/bid/7229 •