Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
qualcomm eudora 5.1 vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2002-2351
Eudora 5.1 allows remote malicious users to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing "." (dot).
Qualcomm Eudora 5.2.1
Qualcomm Eudora 6.0.1
Qualcomm Eudora 6.1.1
Qualcomm Eudora 5.1
Qualcomm Eudora 5.2
Qualcomm Eudora 6.0
2 EDB exploits
5
CVSSv2
CVE-2002-1770
Qualcomm Eudora 5.1 allows remote malicious users to execute arbitrary code via an HTML e-mail message that uses a file:// URL in a t:video tag to reference an attached Windows Media Player file containing JavaScript code, which is launched and executed in the My Computer zone by...
Qualcomm Eudora 5.1
5
CVSSv2
CVE-2002-0456
Eudora 5.1 and previous versions versions stores attachments in a directory with a fixed name, which could make it easier for malicious users to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames.
Qualcomm Eudora 5.1
7.5
CVSSv2
CVE-2001-0365
Eudora prior to 5.1 allows a remote malicious user to execute arbitrary code, when the 'Use Microsoft Viewer' and 'allow executables in HTML content' options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code...
Qualcomm Eudora 5.0.2
Qualcomm Eudora
1 EDB exploit
7.5
CVSSv2
CVE-2001-1326
Eudora 5.1 allows remote malicious users to execute arbitrary code when the "Use Microsoft Viewer" option is enabled and the "allow executables in HTML content" option is disabled, via an HTML email with a form that is activated from an image that the attacker...
Qualcomm Eudora 5.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started