Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paul szabo vulnerabilities and exploits
(subscribe to this query)
520
VMScore
CVE-2000-0342
Eudora 4.x allows remote malicious users to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment."
Qualcomm Eudora 4.0
4 EDB exploits
515
VMScore
CVE-2004-2005
Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote malicious users to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name.
Qualcomm Eudora 6.0.3
Qualcomm Eudora 6.1
Qualcomm Eudora 5.2.1
Qualcomm Eudora 6.0
Qualcomm Eudora 6.0.1
1 EDB exploit
505
VMScore
CVE-2004-1944
Eudora 6.1 and 6.0.3 for Windows allows remote malicious users to cause a denial of service (crash) via a deeply nested multipart MIME message.
Qualcomm Eudora 6.0.3
Qualcomm Eudora 6.1
1 EDB exploit
505
VMScore
CVE-2003-0376
Buffer overflow in Eudora 5.2.1 allows remote malicious users to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . (dot) characters.
Qualcomm Eudora 5.2.1
1 EDB exploit
755
VMScore
CVE-2003-0508
Buffer overflow in the WWWLaunchNetscape function of Adobe Acrobat Reader (acroread) 5.0.7 and previous versions allows remote malicious users to execute arbitrary code via a .pdf file with a long mailto link.
Adobe Acrobat Reader
1 EDB exploit
215
VMScore
CVE-2005-0023
gnome-pty-helper in GNOME libzvt2 and libvte4 allows local users to spoof the logon hostname via a modified DISPLAY environment variable. NOTE: the severity of this issue has been disputed.
Gnome Libvte4
Gnome Libzvt2 1.4.2.19
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2