Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paul szabo vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2000-0342
Eudora 4.x allows remote malicious users to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment."
Qualcomm Eudora 4.0
4 EDB exploits
NA
CVE-2004-1944
Eudora 6.1 and 6.0.3 for Windows allows remote malicious users to cause a denial of service (crash) via a deeply nested multipart MIME message.
Qualcomm Eudora 6.0.3
Qualcomm Eudora 6.1
1 EDB exploit
NA
CVE-2003-0508
Buffer overflow in the WWWLaunchNetscape function of Adobe Acrobat Reader (acroread) 5.0.7 and previous versions allows remote malicious users to execute arbitrary code via a .pdf file with a long mailto link.
Adobe Acrobat Reader
1 EDB exploit
NA
CVE-2003-0376
Buffer overflow in Eudora 5.2.1 allows remote malicious users to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . (dot) characters.
Qualcomm Eudora 5.2.1
1 EDB exploit
NA
CVE-2004-2005
Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote malicious users to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name.
Qualcomm Eudora 6.0.3
Qualcomm Eudora 6.1
Qualcomm Eudora 5.2.1
Qualcomm Eudora 6.0
Qualcomm Eudora 6.0.1
1 EDB exploit
NA
CVE-2005-0023
gnome-pty-helper in GNOME libzvt2 and libvte4 allows local users to spoof the logon hostname via a modified DISPLAY environment variable. NOTE: the severity of this issue has been disputed.
Gnome Libvte4
Gnome Libzvt2 1.4.2.19
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3380
CVE-2024-1694
local file inclusion
CVE-2024-5645
CVE-2024-24919
XSS
CVE-2024-36774
CVE-2024-21306
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2