Show filters
200 Total Results
Displaying 181-190 of 200
Sort by:
Attacker Value
Unknown

CVE-2006-5090

Disclosure Date: September 29, 2006 (last updated October 04, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in Phoenix Evolution CMS (PECMS) allow remote attackers to inject arbitrary web script or HTML via the (1) mod or (2) action parameters in index.php, or the (3) pageid parameter in modules/pageedit/index.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
0
Attacker Value
Unknown

CVE-2006-4678

Disclosure Date: September 11, 2006 (last updated October 04, 2023)
PHP remote file inclusion vulnerability in News Evolution 3.0.3 allows remote attackers to execute arbitrary PHP code via the _NE[AbsPath] parameter in (1) install.php and (2) migrateNE2toNE3.php.
0
Attacker Value
Unknown

CVE-2006-2789

Disclosure Date: June 02, 2006 (last updated October 04, 2023)
Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used.
0
Attacker Value
Unknown

CVE-2006-0040

Disclosure Date: March 10, 2006 (last updated February 22, 2025)
GNOME Evolution 2.4.2.1 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a text e-mail with a large number of URLs, possibly due to unknown problems in gtkhtml.
0
Attacker Value
Unknown

CVE-2006-0528

Disclosure Date: February 02, 2006 (last updated February 22, 2025)
The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment.
0
Attacker Value
Unknown

CVE-2005-2550

Disclosure Date: August 12, 2005 (last updated February 22, 2025)
Format string vulnerability in Evolution 1.4 through 2.3.6.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the calendar entries such as task lists, which are not properly handled when the user selects the Calendars tab.
0
Attacker Value
Unknown

CVE-2005-2549

Disclosure Date: August 12, 2005 (last updated February 22, 2025)
Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.
0
Attacker Value
Unknown

CVE-2005-0848

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Multiple games developed by FUN labs, including 4X4 Off-road Adventure III, Big Game Hunter, Dangerous Hunts, Deer Hunt, Revolution, Secret Service, Shadow Force, and US Most Wanted, allow remote attackers to cause a denial of service via an empty UDP packet to the server, which cannot detect that a new packet has arrived using the socket ioctl.
0
Attacker Value
Unknown

CVE-2005-0806

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Evolution 2.0.3 allows remote attackers to cause a denial of service (application crash or hang) via crafted messages, possibly involving charsets in attachment filenames.
0
Attacker Value
Unknown

CVE-2005-0849

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Multiple games developed by FUN labs, including 4X4 Off-road Adventure III, Big Game Hunter, Dangerous Hunts, Deer Hunt, Revolution, Secret Service, Shadow Force, and US Most Wanted, allow remote attackers to cause a denial of service (crash from invalid memory access) via a malformed join packet with values that cause the server to copy more memory than was actually provided in the packet.
0