Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Imapsync
(Imapsync_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-05-30 | CVE-2023-34204 | imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it. | Imapsync | 6.5 | ||
2014-04-18 | CVE-2013-4279 | imapsync 1.564 and earlier performs a release check by default, which sends sensitive information (imapsync, operating system, and Perl version) to the developer's site. | Imapsync | N/A | ||
2014-04-18 | CVE-2014-2014 | imapsync before 1.584, when running with the --tls option, attempts a cleartext login when a certificate verification failure occurs, which allows remote attackers to obtain credentials by sniffing the network. | Imapsync | N/A |