Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:qualcomm:eudora:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "36428240-F799-43AC-9B1D-6B1E1F408E6E", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "812A1AE1-56DE-4AA7-9AE8-FE36089189F5", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "A2A8B413-CD80-4D91-BE69-9063EA60345B", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A9F8ADFF-D7B7-4907-B5DB-3920BC6EFB7B", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E2DA75D9-846D-4B0D-9982-DD852CEBECB5", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC95E6A2-8EDB-459B-9051-8372C3A7AEEB", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460E6D-6093-44C3-91C7-BD75B3AE4351", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:5.0.2j_r2:*:*:*:*:*:*:*", "matchCriteriaId": "8AEC74EC-3A6E-45F3-A2DD-1815638B4692", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E129DE88-C286-41CC-B82F-C80718E19701", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "32956E1B-E52C-4290-ABDA-B345CD0F682B", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:5.1j:*:*:*:*:*:*:*", "matchCriteriaId": "B0903FE4-73CB-44D9-AC2C-DCE444ADB06C", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:5.1j_r3:*:*:*:*:*:*:*", "matchCriteriaId": "A34F7255-50CD-4C6F-8F4F-C0C267DD6646", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A8953ECC-B326-4E41-A4CE-E5F1F8D905EE", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:5.2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "850E6ED5-4EBE-431A-BF7F-CF2F7B7DD440", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AD34A80-171B-4892-A427-633BB8F2085E", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8EEF7CAC-0603-436B-B2AD-448AA17D82F5", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "F01DA3EF-92F6-470E-AE4D-4CDD2776B445", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:6.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "C818A9AE-446B-496C-A47B-E201B075F310", "vulnerable": false}, {"criteria": "cpe:2.3:a:qualcomm:eudora:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "A72C4B66-AFEC-4035-BD72-A1133E6CCD4F", "vulnerable": false}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long \"To:\" field, possibly due to a buffer overflow."}], "id": "CVE-2004-2301", "lastModified": "2025-04-03T01:03:51.193", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2004-12-31T05:00:00.000", "references": [{"source": "cve@mitre.org", "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/10398"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16246"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/10398"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16246"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}