29 results (0.009 seconds)

CVSS: 7.5EPSS: 29%CPEs: 1EXPL: 2

Buffer overflow in the IMAPd service in Qualcomm Eudora WorldMail 9.0.333.0 allows remote attackers to execute arbitrary code via a long string in a UID command. Desdbordamiento de buffer en el servicio IMAPd en Qualcomm Eudora WorldMail 9.0.333.0 permite a atacantes remotos ejecutar código arbitrario a través de una cadena larga en un comando UID. • https://www.exploit-db.com/exploits/31694 http://osvdb.org/show/osvdb/104071 http://www.exploit-db.com/exploits/31694 https://exchange.xforce.ibmcloud.com/vulnerabilities/91833 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in Qualcomm Eudora 7.1.0.9 allows user-assisted, remote IMAP servers to execute arbitrary code via a long FLAGS response to a SELECT INBOX command. Desbordamiento de búfer en Qualcomm Eudora 7.1.0.9 permite a atacantes con la intervención de usuarios en servidores remotos IMAP ejecutar código de su elección a través de respuestas largas FLAGS en un comando SELECT INBOX. • https://www.exploit-db.com/exploits/4014 http://osvdb.org/36197 http://www.securityfocus.com/bid/24251 https://exchange.xforce.ibmcloud.com/vulnerabilities/34625 •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 1

Stack-based buffer overflow in Eudora 7.1 allows user-assisted, remote SMTP servers to execute arbitrary code via a long SMTP reply. NOTE: the user must click through a warning about a possible buffer overflow exploit to trigger this issue. Desbordamiento de búfer basado en pila en Eudora 7.1 permite a servidores remotos SMTP con la intervención del usuario, ejcutar código de su elección a través de respuesta SMTP largas. NOTA: el usuario debería hacer click a través de un aviso sobre un posible desbordamiento de búfer para disparar este asunto. • https://www.exploit-db.com/exploits/3934 http://osvdb.org/36198 http://secunia.com/advisories/25282 https://exchange.xforce.ibmcloud.com/vulnerabilities/34324 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

QUALCOMM Eudora WorldMail 4.0 allows remote attackers to cause a denial of service, as demonstrated by a certain module in VulnDisco Pack. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. As of 20061118, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. QUALCOMM Eudora WorldMail 4.0 permite a atacantes remotos provocar una denegación de servicio, como ha sido demostrado por cierto módulo en VulnDisco Pack. • http://secunia.com/advisories/22836 http://web.archive.org/web/20060502082622/www.gleg.net/vulndisco_pack_professional.shtml http://www.securityfocus.com/bid/21099 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Multiple buffer overflows in Eudora Worldmail, possibly Worldmail 3 version 6.1.22.0, have unknown impact and attack vectors, as demonstrated by the (1) "Eudora WorldMail stack overflow" and (2) "Eudora WorldMail heap overflow" modules in VulnDisco Pack. NOTE: Some of these details are obtained from third party information. As of 20061118, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. Múltiples desbordamientos de búfer en Eudora Worldmail, posiblemente Worldmail 3 versión 6.1.22.0, tiene impacto y vectores de ataque desconocidos, como ha sido demostrado por los módulos (1) "Eudora WorldMail stack overflow" and (2) "Eudora WorldMail heap overflow" en VulnDisco Pack. • http://secunia.com/advisories/22832 http://web.archive.org/web/20060502082657/http://www.gleg.net/vulndisco_pack_standard.shtml http://www.securityfocus.com/bid/21095 •