Filters

GNOME EvolutionGNOME Evolution through 3.38.3 produces a "Valid signature" message for an unknown identifier on a p…

3.3
First published (updated )

GNOME EvolutionAn issue was discovered in GNOME Evolution before 3.35.91. By using the proprietary (non-RFC6068) "m…

First published (updated )

ubuntu/evolution-data-serverGNOME Evolution through 3.28.2 is prone to OpenPGP signatures being spoofed for arbitrary messages u…

First published (updated )

ubuntu/evolution-data-serverInfoleak

First published (updated )

GNOME EvolutionBuffer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft OutlookThe S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can in…

First published (updated )

GNOME EvolutionInfoleak

7.5
First published (updated )

GNOME EvolutionInfoleak

First published (updated )

GNOME EvolutionPath Traversal, Buffer Overflow

7.8
First published (updated )

Mozilla Network Security ServicesBuffer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

GNOME EvolutionThe Mailer component in Evolution 2.26.1 and earlier uses world-readable permissions for the .evolut…

2.1
First published (updated )

GNOME EvolutionBuffer Overflow

First published (updated )

GNOME EvolutionBuffer Overflow

7.6
First published (updated )

GNOME EvolutionFormat string vulnerability in the emf_multipart_encrypted function in mail/em-format.c in Evolution…

First published (updated )

GNOME EvolutionCamel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMA…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

GNOME EvolutionEvolution 2.8.1 and earlier does not properly use the --status-fd argument when invoking GnuPG, whic…

First published (updated )

GNOME EvolutionEvolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabl…

2.6
First published (updated )

GNOME EvolutionGNOME Evolution 2.4.2.1 and earlier allows remote attackers to cause a denial of service (CPU and me…

First published (updated )

GNOME EvolutionBuffer Overflow

First published (updated )

GNOME EvolutionMultiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to ca…

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

GNOME EvolutionFormat string vulnerability in Evolution 1.4 through 2.3.6.1 allows remote attackers to cause a deni…

7.5
First published (updated )

Ximian EvolutionBuffer Overflow, Integer Overflow

First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203