5 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 20EXPL: 0

31 Dec 2004 — Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long "To:" field, possibly due to a buffer overflow. • http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2002 — Eudora email client 5.1.1, with "use Microsoft viewer" enabled, allows remote attackers to execute arbitrary programs via an HTML email message containing a META refresh tag that references an embedded .mhtml file with ActiveX controls that execute a second embedded program, which is processed by Internet Explorer. • http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000644.html •

CVSS: 9.8EPSS: 3%CPEs: 6EXPL: 3

31 Dec 2002 — Eudora 5.1 allows remote attackers to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing "." (dot). • https://www.exploit-db.com/exploits/21695 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

21 Nov 2002 — Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context. Qualcomm Eudora 5.1.1, 5.2, y posiblemente otras versiones almacenan adjuntos de correo electrónico en una localización predecible, lo que permite a atacantes remotos leer ficheros arbitrarios mediante un enlace que c... • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0079.html •

CVSS: 9.8EPSS: 4%CPEs: 2EXPL: 1

07 Aug 2002 — Buffer overflow in Eudora 5.1.1 and 5.0-J for Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a multi-part message with a long boundary string. • https://www.exploit-db.com/exploits/21680 •