RSS   Podatności dla 'Sylpheed'   RSS

2007-08-27
 
CVE-2007-2958

 

 
Format string vulnerability in the inc_put_error function in src/inc.c in Sylpheed 2.4.4, and Sylpheed-Claws (Claws Mail) 1.9.100 and 2.10.0, allows remote POP3 servers to execute arbitrary code via format string specifiers in crafted replies.

 
2007-03-06
 
CVE-2007-1267

CWE-Other
 

 
Sylpheed 2.2.7 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Sylpheed from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.

 
2006-06-08
 
CVE-2006-2920

CWE-20
 

 
Sylpheed-Claws before 2.2.2 and Sylpheed before 2.2.6 allow remote attackers to bypass the URI check functionality and makes it easier to conduct phishing attacks via a URI that begins with a space character.

 
2005-11-20
 
CVE-2005-3354

 

 
Stack-based buffer overflow in the ldif_get_line function in ldif.c of Sylpheed before 2.1.6 allows user-assisted attackers to execute arbitrary code by having local users import LDIF files with long lines.

 
2005-05-02
 
CVE-2005-0926

 

 
Buffer overflow in Sylpheed before 1.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attachments with MIME-encoded file names.

 
2005-03-07
 
CVE-2005-0667

 

 
Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message.

 
2003-11-17
 
CVE-2003-0852

 

 
Format string vulnerability in send_message.c for Sylpheed-claws 0.9.4 through 0.9.6 allows remote SMTP servers to cause a denial of service (crash) in sylpheed via format strings in an error message.

 

 >>> Vendor: Sylpheed 2 Produkty
Sylpheed email client
Sylpheed


Copyright 2022, cxsecurity.com

 

Back to Top