Description
Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the 'Use Microsoft Viewer' and 'allow executables in HTML content' options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by http-equiv · textremotewindows
https://www.exploit-db.com/exploits/20688
References (3)
Core 3
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=98503741910995&w=2
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/2490
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/6262
Scores
EPSS
0.0482
EPSS Percentile
89.5%
Details
Status
published
Products (2)
qualcomm/eudora
5.0.2
qualcomm/eudora
< 5.1
Published
Jun 27, 2001
Tracked Since
Feb 18, 2026