Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown

CVE-2022-4974

Disclosure Date: October 16, 2024 (last updated October 16, 2024)
The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.
Attacker Value
Unknown

CVE-2018-1999023

Disclosure Date: July 23, 2018 (last updated November 27, 2024)
The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content.
0
Attacker Value
Unknown

CVE-2017-17689

Disclosure Date: May 16, 2018 (last updated November 26, 2024)
The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
0
Attacker Value
Unknown

CVE-2006-0918

Disclosure Date: February 28, 2006 (last updated February 22, 2025)
Buffer overflow in RITLabs The Bat! 3.60.07 allows remote attackers to execute arbitrary code via a long Subject field.
0
Attacker Value
Unknown

CVE-2006-0630

Disclosure Date: February 10, 2006 (last updated February 22, 2025)
RITLabs The Bat! before 3.0.0.15 displays certain important headers from encapsulated data in message/partial MIME messages, instead of the real headers, which is in violation of RFC2046 header merging rules and allows remote attackers to spoof the origin of e-mail by sending a fragmented message, as demonstrated using spoofed Received: and Message-ID: headers.
0
Attacker Value
Unknown

CVE-2003-1133

Disclosure Date: December 31, 2003 (last updated February 22, 2025)
Rit Research Labs The Bat! 1.0.11 through 2.0 creates new accounts with insecure ACLs, which allows local users to read other users' email messages.
0
Attacker Value
Unknown

CVE-2002-0338

Disclosure Date: June 25, 2002 (last updated February 22, 2025)
The Bat! 1.53d and 1.54beta, and possibly other versions, allows remote attackers to cause a denial of service (crash) via an attachment whose name includes an MS-DOS device name.
0
Attacker Value
Unknown

CVE-2001-0675

Disclosure Date: September 20, 2001 (last updated February 22, 2025)
Rit Research Labs The Bat! 1.51 for Windows allows a remote attacker to cause a denial of service by sending an email to a user's account containing a carriage return <CR> that is not followed by a line feed <LF>.
0
Attacker Value
Unknown

CVE-2001-0676

Disclosure Date: September 20, 2001 (last updated February 22, 2025)
Directory traversal vulnerability in Rit Research Labs The Bat! 1.48f and earlier allows a remote attacker to create arbitrary files via a "dot dot" attack in the filename for an attachment.
0
Attacker Value
Unknown

CVE-2001-0398

Disclosure Date: June 18, 2001 (last updated February 22, 2025)
The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment's type with a different icon.
0