4 results (0.019 seconds)

CVSS: 5.0EPSS: 1%CPEs: 20EXPL: 0

Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long "To:" field, possibly due to a buffer overflow. • http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt http://www.securityfocus.com/bid/10398 https://exchange.xforce.ibmcloud.com/vulnerabilities/16246 •

CVSS: 5.1EPSS: 16%CPEs: 5EXPL: 2

Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote attackers to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name. • https://www.exploit-db.com/exploits/24096 http://lists.netsys.com/pipermail/full-disclosure/2004-May/021059.html http://marc.info/?l=bugtraq&m=108395487628044&w=2 http://secunia.com/advisories/11568 http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt http://www.securityfocus.com/bid/10298 https://exchange.xforce.ibmcloud.com/vulnerabilities/16086 •

CVSS: 5.0EPSS: 4%CPEs: 2EXPL: 3

Eudora 6.1 and 6.0.3 for Windows allows remote attackers to cause a denial of service (crash) via a deeply nested multipart MIME message. • https://www.exploit-db.com/exploits/24000 http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.html http://marc.info/?l=bugtraq&m=108241694627321&w=2 http://secunia.com/advisories/11360 http://www.securityfocus.com/bid/10137 https://exchange.xforce.ibmcloud.com/vulnerabilities/15857 •

CVSS: 6.4EPSS: 1%CPEs: 6EXPL: 3

Eudora 5.1 allows remote attackers to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing "." (dot). • https://www.exploit-db.com/exploits/21695 https://www.exploit-db.com/exploits/21696 http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00142.html http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt http://www.securityfocus.com/bid/5432 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •