Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome evolution vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2008-3533
Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and prior to 2.24 allows remote malicious users to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp wi...
Gnome Yelp
Gnome Gnome 2.20
Gnome Gnome 2.22
1 EDB exploit
828
VMScore
CVE-2008-1109
Heap-based buffer overflow in Evolution 2.22.1 allows user-assisted remote malicious users to execute arbitrary code via a long DESCRIPTION property in an iCalendar attachment, which is not properly handled during a reply in the calendar view (aka the Calendars window).
Gnome Evolution 2.22.1
676
VMScore
CVE-2008-1108
Buffer overflow in Evolution 2.22.1, when the ITip Formatter plugin is disabled, allows remote malicious users to execute arbitrary code via a long timezone string in an iCalendar attachment.
Gnome Evolution 2.2.1
668
VMScore
CVE-2018-12422
addressbook/backends/ldap/e-book-backend-ldap.c in Evolution-Data-Server in GNOME Evolution up to and including 3.29.2 might allow malicious users to trigger a Buffer Overflow via a long query that is processed by the strcat function. NOTE: the software maintainer disputes this b...
Gnome Evolution
668
VMScore
CVE-2005-2549
Multiple format string vulnerabilities in Evolution 1.5 up to and including 2.3.6.1 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from...
Gnome Evolution 2.0
Gnome Evolution 2.1
Gnome Evolution 2.3.2
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 1.5
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6.1
Gnome Evolution 2.2
Gnome Evolution 2.3.1
668
VMScore
CVE-2005-2550
Format string vulnerability in Evolution 1.4 up to and including 2.3.6.1 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via the calendar entries such as task lists, which are not properly handled when the user selects the Ca...
Gnome Evolution 1.4
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 2.1
Gnome Evolution 2.2
Gnome Evolution 2.3.1
Gnome Evolution 2.3.2
Gnome Evolution 1.5
Gnome Evolution 2.0
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6.1
641
VMScore
CVE-2005-0102
Integer overflow in camel-lock-helper in Evolution 2.0.2 and previous versions allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
Gnome Evolution
Debian Debian Linux 3.0
605
VMScore
CVE-2009-3721
Multiple directory traversal and buffer overflow vulnerabilities were discovered in yTNEF, and in Evolution's TNEF parser that is derived from yTNEF. A crafted email could cause these applications to write data in arbitrary locations on the filesystem, crash, or potentially ...
Gnome Evolution
Ytnef Project Ytnef
605
VMScore
CVE-2008-0072
Format string vulnerability in the emf_multipart_encrypted function in mail/em-format.c in Evolution 2.12.3 and previous versions allows remote malicious users to execute arbitrary code via a crafted encrypted message, as demonstrated using the Version field.
Gnome Evolution
605
VMScore
CVE-2007-3257
Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.
Gnome Evolution 1.11
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »