Filters

Redhat Enterprise LinuxMutt: neomutt: bcc email header field is indirectly leaked by cryptographic info block

First published (updated )

Redhat Enterprise LinuxMutt: neomutt: in-reply-to email header field it not protected by cryptograpic signing

First published (updated )

Redhat Enterprise LinuxMutt: neomutt: to and cc email header fields are not protected by cryptographic signing

7.4
First published (updated )

ubuntu/muttUndefined Behavior for Input to API in Mutt

First published (updated )

ubuntu/muttUndefined Behavior for Input to API in Mutt

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Mutt MuttBuffer Overflow

First published (updated )

Mutt MuttMutt 1.11.0 through 2.0.x before 2.0.7 (and NeoMutt 2019-10-25 through 2021-05-04) has a $imap_qresy…

First published (updated )

debian/muttrfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavail…

First published (updated )

Mutt MuttMutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if …

First published (updated )

Canonical Ubuntu LinuxMutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, …

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Canonical Ubuntu LinuxMutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.

First published (updated )

Canonical Ubuntu LinuxMutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, t…

First published (updated )

Debian Debian LinuxMutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests …

First published (updated )

Canonical Ubuntu LinuxBuffer Overflow

First published (updated )

Canonical Ubuntu LinuxBuffer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Redhat Enterprise Linux Server EusBuffer Overflow, Path Traversal

First published (updated )

Canonical Ubuntu LinuxInteger Underflow

First published (updated )

Canonical Ubuntu LinuxBuffer Overflow

First published (updated )

Debian Debian LinuxInput Validation

First published (updated )

Debian Debian LinuxPath Traversal

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Canonical Ubuntu LinuxOS Command Injection

First published (updated )

Debian Debian LinuxLast updated 24 July 2024

First published (updated )

Canonical Ubuntu LinuxOS Command Injection, Code Injection

First published (updated )

Canonical Ubuntu LinuxBuffer Overflow

First published (updated )

Debian Debian LinuxInput Validation

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

debian/muttBuffer Overflow

First published (updated )

Mutt MuttBuffer Overflow

First published (updated )

Mutt MuttInput Validation

First published (updated )

Mutt Muttmutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify th…

First published (updated )

Mutt Muttmutt_ssl.c in mutt 1.5.19 and 1.5.20, when OpenSSL is used, does not properly handle a '\0' characte…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Mutt MuttMutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ssl_gnutls.c), allows …

First published (updated )

Mutt MuttBuffer Overflow

3.5
First published (updated )

Mutt MuttMutt 1.5.13 and earlier does not properly use the --status-fd argument when invoking GnuPG, which pr…

First published (updated )

Mutt MuttRace Condition

1.2
First published (updated )

Mutt MuttRace Condition

1.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Mutt MuttBuffer Overflow

7.5
First published (updated )

Mutt MuttBuffer Overflow

7.5
First published (updated )

Mutt MuttBuffer Overflow

7.5
First published (updated )

Mozilla MozillaInteger Overflow

First published (updated )

Mutt MuttInteger Overflow

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Mutt MuttBuffer Overflow

7.5
First published (updated )

Mutt MuttBuffer Overflow

7.5
First published (updated )

Mutt MuttVulnerability in RFC822 address parser in mutt before 1.2.5.1 and mutt 1.3.x before 1.3.25 allows re…

7.5
First published (updated )

Mandrakesoft Mandrake LinuxFormat string vulnerability in Mutt before 1.2.5 allows a remote malicious IMAP server to execute ar…

7.5
First published (updated )

Mutt Mutt Mail ClientBuffer Overflow

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Mutt MuttMutt mail client allows a remote attacker to execute commands via shell metacharacters.

7.5
First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203