Filtered by vendor Claws-mail
Subscribe
Total
9 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-37746 | 3 Claws-mail, Fedoraproject, Sylpheed Project | 3 Claws-mail, Fedora, Sylpheed | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
textview_uri_security_check in textview.c in Claws Mail before 3.18.0, and Sylpheed through 3.7.0, does not have sufficient link checks before accepting a click. | |||||
CVE-2020-15917 | 1 Claws-mail | 1 Claws-mail | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled. | |||||
CVE-2020-16094 | 2 Claws-mail, Fedoraproject | 2 Claws-mail, Fedora | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
In imap_scan_tree_recursive in Claws Mail through 3.17.6, a malicious IMAP server can trigger stack consumption because of unlimited recursion into subdirectories during a rebuild of the folder tree. | |||||
CVE-2012-5527 | 1 Claws-mail | 1 Vcalendar | 2024-02-04 | 2.1 LOW | 5.5 MEDIUM |
Claws Mail vCalendar plugin: credentials exposed on interface | |||||
CVE-2019-10735 | 1 Claws-mail | 1 Mail | 2024-02-04 | 4.3 MEDIUM | 4.3 MEDIUM |
In Claws Mail 3.14.1, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker. | |||||
CVE-2015-8708 | 1 Claws-mail | 1 Claws-mail | 2024-02-04 | 7.5 HIGH | 7.3 HIGH |
Stack-based buffer overflow in the conv_euctojis function in codeconv.c in Claws Mail 3.13.1 allows remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8614. | |||||
CVE-2015-8614 | 2 Claws-mail, Opensuse | 3 Claws-mail, Leap, Opensuse | 2024-02-04 | 7.5 HIGH | 7.3 HIGH |
Multiple stack-based buffer overflows in the (1) conv_jistoeuc, (2) conv_euctojis, and (3) conv_sjistoeuc functions in codeconv.c in Claws Mail before 3.13.1 allow remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion. | |||||
CVE-2014-2576 | 2 Claws-mail, Opensuse | 2 Claws-mail, Opensuse | 2024-02-04 | 6.8 MEDIUM | N/A |
plugins/rssyl/feed.c in Claws Mail before 3.10.0 disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks. | |||||
CVE-2012-4507 | 1 Claws-mail | 1 Claws-mail | 2024-02-04 | 5.0 MEDIUM | N/A |
The strchr function in procmime.c in Claws Mail (aka claws-mail) 3.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted email. |