Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Mutt
(Mutt)Repositories | https://github.com/neomutt/neomutt |
#Vulnerabilities | 42 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2006-06-27 | CVE-2006-3242 | Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server. | Mutt | N/A | ||
2020-06-21 | CVE-2020-14954 | Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection." | Ubuntu_linux, Debian_linux, Fedora, Mutt, Neomutt, Leap | 5.9 |