Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
qualcomm eudora 5.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-2351
Eudora 5.1 allows remote malicious users to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing "." (dot).
Qualcomm Eudora 5.2
Qualcomm Eudora 6.0
Qualcomm Eudora 5.2.1
Qualcomm Eudora 6.1.1
Qualcomm Eudora 5.1
Qualcomm Eudora 6.0.1
2 EDB exploits
NA
CVE-2002-1770
Qualcomm Eudora 5.1 allows remote malicious users to execute arbitrary code via an HTML e-mail message that uses a file:// URL in a t:video tag to reference an attached Windows Media Player file containing JavaScript code, which is launched and executed in the My Computer zone by...
Qualcomm Eudora 5.1
NA
CVE-2002-0456
Eudora 5.1 and previous versions versions stores attachments in a directory with a fixed name, which could make it easier for malicious users to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames.
Qualcomm Eudora 5.1
NA
CVE-2001-0365
Eudora prior to 5.1 allows a remote malicious user to execute arbitrary code, when the 'Use Microsoft Viewer' and 'allow executables in HTML content' options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code...
Qualcomm Eudora
Qualcomm Eudora 5.0.2
1 EDB exploit
NA
CVE-2001-1326
Eudora 5.1 allows remote malicious users to execute arbitrary code when the "Use Microsoft Viewer" option is enabled and the "allow executables in HTML content" option is disabled, via an HTML email with a form that is activated from an image that the attacker...
Qualcomm Eudora 5.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started