Vulnerabilities > Qualcomm > Eudora > 5.2.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2004-12-31 | CVE-2004-2301 | Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long "To:" field, possibly due to a buffer overflow. | 5.0 |
2004-05-06 | CVE-2004-2005 | Buffer Overrun vulnerability in Qualcomm Eudora Embedded Hyperlink Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote attackers to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name. | 5.1 |
2003-06-16 | CVE-2003-0376 | Denial-Of-Service vulnerability in Qualcomm Eudora 5.2.1 Buffer overflow in Eudora 5.2.1 allows remote attackers to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . | 5.0 |
2003-06-16 | CVE-2003-0302 | Denial-Of-Service vulnerability in Qualcomm Eudora 5.2.1 The IMAP Client for Eudora 5.2.1 allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large literal size values that cause either integer signedness errors or integer overflow errors. | 5.0 |
2003-06-16 | CVE-2003-0300 | Denial-Of-Service vulnerability in Pine The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors. network low complexity microsoft mozilla mutt qualcomm stuart-parmenter sylpheed university-of-washington ximian | 5.0 |
2003-05-22 | CVE-2003-0336 | Remote Security vulnerability in Qualcomm Eudora 5.2.1 Qualcomm Eudora 5.2.1 allows remote attackers to read arbitrary files via an email message with a carriage return (CR) character in a spoofed "Attachment Converted:" string, which is not properly handled by Eudora. | 5.0 |
2002-12-31 | CVE-2002-2351 | Path Traversal vulnerability in Qualcomm Eudora Eudora 5.1 allows remote attackers to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing "." (dot). | 6.4 |