Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paul szabo vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-0342
Eudora 4.x allows remote malicious users to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment."
Qualcomm Eudora 4.0
4 EDB exploits
5
CVSSv2
CVE-2004-1944
Eudora 6.1 and 6.0.3 for Windows allows remote malicious users to cause a denial of service (crash) via a deeply nested multipart MIME message.
Qualcomm Eudora 6.0.3
Qualcomm Eudora 6.1
1 EDB exploit
5
CVSSv2
CVE-2003-0376
Buffer overflow in Eudora 5.2.1 allows remote malicious users to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . (dot) characters.
Qualcomm Eudora 5.2.1
1 EDB exploit
7.5
CVSSv2
CVE-2003-0508
Buffer overflow in the WWWLaunchNetscape function of Adobe Acrobat Reader (acroread) 5.0.7 and previous versions allows remote malicious users to execute arbitrary code via a .pdf file with a long mailto link.
Adobe Acrobat Reader
1 EDB exploit
2.1
CVSSv2
CVE-2005-0023
gnome-pty-helper in GNOME libzvt2 and libvte4 allows local users to spoof the logon hostname via a modified DISPLAY environment variable. NOTE: the severity of this issue has been disputed.
Gnome Libvte4
Gnome Libzvt2 1.4.2.19
1 EDB exploit
5.1
CVSSv2
CVE-2004-2005
Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote malicious users to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name.
Qualcomm Eudora 6.0.3
Qualcomm Eudora 6.1
Qualcomm Eudora 5.2.1
Qualcomm Eudora 6.0
Qualcomm Eudora 6.0.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2