CVE-2017-17689
- EPSS 0.82%
- Veröffentlicht 16.05.2018 19:29:00
- Zuletzt bearbeitet 21.11.2024 03:18:27
The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
CVE-2006-0918
- EPSS 5.42%
- Veröffentlicht 28.02.2006 11:02:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Buffer overflow in RITLabs The Bat! 3.60.07 allows remote attackers to execute arbitrary code via a long Subject field.
- EPSS 0.7%
- Veröffentlicht 10.02.2006 11:02:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
RITLabs The Bat! before 3.0.0.15 displays certain important headers from encapsulated data in message/partial MIME messages, instead of the real headers, which is in violation of RFC2046 header merging rules and allows remote attackers to spoof the o...
CVE-2003-1133
- EPSS 0.09%
- Veröffentlicht 31.12.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Rit Research Labs The Bat! 1.0.11 through 2.0 creates new accounts with insecure ACLs, which allows local users to read other users' email messages.
- EPSS 10.35%
- Veröffentlicht 25.06.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The Bat! 1.53d and 1.54beta, and possibly other versions, allows remote attackers to cause a denial of service (crash) via an attachment whose name includes an MS-DOS device name.
- EPSS 4.31%
- Veröffentlicht 20.09.2001 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Rit Research Labs The Bat! 1.51 for Windows allows a remote attacker to cause a denial of service by sending an email to a user's account containing a carriage return <CR> that is not followed by a line feed <LF>.
- EPSS 1.06%
- Veröffentlicht 20.09.2001 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Directory traversal vulnerability in Rit Research Labs The Bat! 1.48f and earlier allows a remote attacker to create arbitrary files via a "dot dot" attack in the filename for an attachment.
CVE-2001-0398
- EPSS 1.05%
- Veröffentlicht 18.06.2001 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment's type ...