cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2014-10031,https://securityvulnerability.io/vulnerability/CVE-2014-10031,,Buffer overflow in the IMAPd service in Qualcomm Eudora WorldMail 9.0.333.0 allows remote attackers to execute arbitrary code via a long string in a UID command.,Qualcomm,Eudora Worldmail,,,0.2542000114917755,false,false,false,false,,false,false,2015-01-13T15:00:00.000Z,0 CVE-2007-3166,https://securityvulnerability.io/vulnerability/CVE-2007-3166,,"Buffer overflow in Qualcomm Eudora 7.1.0.9 allows user-assisted, remote IMAP servers to execute arbitrary code via a long FLAGS response to a SELECT INBOX command.",Qualcomm,Eudora,,,0.00853000022470951,false,false,false,false,,false,false,2007-06-11T22:00:00.000Z,0 CVE-2007-2770,https://securityvulnerability.io/vulnerability/CVE-2007-2770,,"Stack-based buffer overflow in Eudora 7.1 allows user-assisted, remote SMTP servers to execute arbitrary code via a long SMTP reply. NOTE: the user must click through a warning about a possible buffer overflow exploit to trigger this issue.",Qualcomm,Eudora,,,0.009189999662339687,false,false,false,false,,false,false,2007-05-21T21:00:00.000Z,0 CVE-2006-6025,https://securityvulnerability.io/vulnerability/CVE-2006-6025,,"QUALCOMM Eudora WorldMail 4.0 allows remote attackers to cause a denial of service, as demonstrated by a certain module in VulnDisco Pack. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. As of 20061118, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.",Qualcomm,Eudora Worldmail,,,0.012160000391304493,false,false,false,false,,false,false,2006-11-21T23:00:00.000Z,0 CVE-2006-6024,https://securityvulnerability.io/vulnerability/CVE-2006-6024,,"Multiple buffer overflows in Eudora Worldmail, possibly Worldmail 3 version 6.1.22.0, have unknown impact and attack vectors, as demonstrated by the (1) ""Eudora WorldMail stack overflow"" and (2) ""Eudora WorldMail heap overflow"" modules in VulnDisco Pack. NOTE: Some of these details are obtained from third party information. As of 20061118, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.",Qualcomm,Eudora Worldmail,,,0.0031900000758469105,false,false,false,false,,false,false,2006-11-21T23:00:00.000Z,0 CVE-2006-0637,https://securityvulnerability.io/vulnerability/CVE-2006-0637,,"Buffer overflow in cram.dll in QUALCOMM Eudora WorldMail 3.0 allows remote attackers to execute arbitrary code via an IMAP APPEND command with a long message literal argument, as demonstrated by Worldmail.pl. NOTE: this is a different vector and a different manipulation than CVE-2005-4267, so it might be a different vulnerability than CVE-2005-4267.",Qualcomm,Eudora Worldmail,,,0.03401000052690506,false,false,false,false,,false,false,2006-02-10T11:00:00.000Z,0 CVE-2004-1521,https://securityvulnerability.io/vulnerability/CVE-2004-1521,,"Eudora 6.2.0.14 does not issue a warning when a user forwards an e-mail message that contains base64 or quoted-printable encoded attachments, which makes it easier for remote attackers to read arbitrary files via spoofed ""Converted"" headers.",Qualcomm,Eudora,,,0.03347000107169151,false,false,false,false,,false,false,2004-12-31T05:00:00.000Z,0 CVE-2004-2005,https://securityvulnerability.io/vulnerability/CVE-2004-2005,,"Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote attackers to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name.",Qualcomm,Eudora,,,0.1959100067615509,false,false,false,false,,false,false,2004-05-06T04:00:00.000Z,0 CVE-2004-1944,https://securityvulnerability.io/vulnerability/CVE-2004-1944,,Eudora 6.1 and 6.0.3 for Windows allows remote attackers to cause a denial of service (crash) via a deeply nested multipart MIME message.,Qualcomm,Eudora,,,0.03689999878406525,false,false,false,false,,false,false,2004-04-14T04:00:00.000Z,0 CVE-2003-0376,https://securityvulnerability.io/vulnerability/CVE-2003-0376,,Buffer overflow in Eudora 5.2.1 allows remote attackers to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . (dot) characters.,Qualcomm,Eudora,,,0.04989999905228615,false,false,false,false,,false,false,2003-06-16T04:00:00.000Z,0 CVE-2003-0302,https://securityvulnerability.io/vulnerability/CVE-2003-0302,,The IMAP Client for Eudora 5.2.1 allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large literal size values that cause either integer signedness errors or integer overflow errors.,Qualcomm,Eudora,,,0.0017600000137463212,false,false,false,false,,false,false,2003-06-16T04:00:00.000Z,0 CVE-2003-0336,https://securityvulnerability.io/vulnerability/CVE-2003-0336,,"Qualcomm Eudora 5.2.1 allows remote attackers to read arbitrary files via an email message with a carriage return (CR) character in a spoofed ""Attachment Converted:"" string, which is not properly handled by Eudora.",Qualcomm,Eudora,,,0.013269999995827675,false,false,false,false,,false,false,2003-05-22T04:00:00.000Z,0 CVE-2002-1770,https://securityvulnerability.io/vulnerability/CVE-2002-1770,,"Qualcomm Eudora 5.1 allows remote attackers to execute arbitrary code via an HTML e-mail message that uses a file:// URL in a t:video tag to reference an attached Windows Media Player file containing JavaScript code, which is launched and executed in the My Computer zone by Internet Explorer.",Qualcomm,Eudora,,,0.042500000447034836,false,false,false,false,,false,false,2002-12-31T05:00:00.000Z,0 CVE-2002-2351,https://securityvulnerability.io/vulnerability/CVE-2002-2351,,"Eudora 5.1 allows remote attackers to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing ""."" (dot).",Qualcomm,Eudora,,,0.010940000414848328,false,false,false,false,,false,false,2002-12-31T05:00:00.000Z,0 CVE-2002-2313,https://securityvulnerability.io/vulnerability/CVE-2002-2313,,"Eudora email client 5.1.1, with ""use Microsoft viewer"" enabled, allows remote attackers to execute arbitrary programs via an HTML email message containing a META refresh tag that references an embedded .mhtml file with ActiveX controls that execute a second embedded program, which is processed by Internet Explorer.",Qualcomm,Eudora,,,0.0037499999161809683,false,false,false,false,,false,false,2002-12-31T05:00:00.000Z,0 CVE-2002-1210,https://securityvulnerability.io/vulnerability/CVE-2002-1210,,"Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context.",Qualcomm,Eudora,,,0.0034600000362843275,false,false,false,false,,false,false,2002-11-29T05:00:00.000Z,0 CVE-2002-0833,https://securityvulnerability.io/vulnerability/CVE-2002-0833,,"Buffer overflow in Eudora 5.1.1 and 5.0-J for Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a multi-part message with a long boundary string.",Qualcomm,Eudora,,,0.07953000068664551,false,false,false,false,,false,false,2002-08-12T04:00:00.000Z,0 CVE-2002-0456,https://securityvulnerability.io/vulnerability/CVE-2002-0456,,"Eudora 5.1 and earlier versions stores attachments in a directory with a fixed name, which could make it easier for attackers to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames.",Qualcomm,Eudora,,,0.002409999957308173,false,false,false,false,,false,false,2002-08-12T04:00:00.000Z,0 CVE-2001-0677,https://securityvulnerability.io/vulnerability/CVE-2001-0677,,"Eudora 5.0.2 allows a remote attacker to read arbitrary files via an email with the path of the target file in the ""Attachment Converted"" MIME header, which sends the file when the email is forwarded to the attacker by the user.",Qualcomm,Eudora,,,0.011060000397264957,false,false,false,false,,false,false,2001-09-20T04:00:00.000Z,0 CVE-2001-1318,https://securityvulnerability.io/vulnerability/CVE-2001-1318,,"Vulnerabilities in Qualcomm Eudora WorldMail Server may allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, as demonstrated by the PROTOS LDAPv3 test suite.",Qualcomm,Eudora Worldmail Server,,,0.09540999680757523,false,false,false,false,,false,false,2001-07-16T04:00:00.000Z,0 CVE-2001-0365,https://securityvulnerability.io/vulnerability/CVE-2001-0365,,"Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the 'Use Microsoft Viewer' and 'allow executables in HTML content' options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags.",Qualcomm,Eudora,,,0.031300000846385956,false,false,false,false,,false,false,2001-06-27T04:00:00.000Z,0 CVE-2001-1326,https://securityvulnerability.io/vulnerability/CVE-2001-1326,,"Eudora 5.1 allows remote attackers to execute arbitrary code when the ""Use Microsoft Viewer"" option is enabled and the ""allow executables in HTML content"" option is disabled, via an HTML email with a form that is activated from an image that the attacker spoofs as a link, which causes the user to execute the form and access embedded attachments.",Qualcomm,Eudora,,,0.010610000230371952,false,false,false,false,,false,false,2001-05-29T04:00:00.000Z,0 CVE-2000-0874,https://securityvulnerability.io/vulnerability/CVE-2000-0874,,Eudora mail client includes the absolute path of the sender's host within a virtual card (VCF).,Qualcomm,Eudora,,,0.0023900000378489494,false,false,false,false,,false,false,2000-11-14T05:00:00.000Z,0 CVE-1999-0427,https://securityvulnerability.io/vulnerability/CVE-1999-0427,,Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.,Qualcomm,"Eudora,Eudora Pro,Eudora Light",,,0.007269999943673611,false,false,false,false,,false,false,2000-05-01T04:00:00.000Z,0 CVE-2000-0342,https://securityvulnerability.io/vulnerability/CVE-2000-0342,,"Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka ""Stealth Attachment.""",Qualcomm,Eudora,7.5,HIGH,0.012140000239014626,false,false,false,false,,false,false,2000-04-28T04:00:00.000Z,0