Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome evolution 2.2 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2005-2549
Multiple format string vulnerabilities in Evolution 1.5 up to and including 2.3.6.1 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from...
Gnome Evolution 2.0
Gnome Evolution 2.1
Gnome Evolution 2.3.2
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 1.5
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6.1
Gnome Evolution 2.2
Gnome Evolution 2.3.1
7.5
CVSSv2
CVE-2005-2550
Format string vulnerability in Evolution 1.4 up to and including 2.3.6.1 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via the calendar entries such as task lists, which are not properly handled when the user selects the Ca...
Gnome Evolution 1.4
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 2.1
Gnome Evolution 2.2
Gnome Evolution 2.3.1
Gnome Evolution 2.3.2
Gnome Evolution 1.5
Gnome Evolution 2.0
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6.1
4.3
CVSSv2
CVE-2011-3201
GNOME Evolution prior to 3.2.3 allows user-assisted remote malicious users to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.
Oracle Solaris 11.2
Gnome Evolution 2.4
Gnome Evolution 2.0.1
Gnome Evolution 2.3.6
Gnome Evolution 1.11
Gnome Evolution 1.5
Gnome Evolution 1.2.4
Gnome Evolution 1.4.5
Gnome Evolution 1.4.6
Gnome Evolution 2.0.2
Gnome Evolution 2.12.3
Gnome Evolution 2.3.5
Gnome Evolution 1.4.4
Gnome Evolution 2.24.5
Gnome Evolution 2.26.1
Gnome Evolution 1.2.1
Gnome Evolution 2.3.2
Gnome Evolution 2.2
Gnome Evolution 2.6
Gnome Evolution 1.0.8
Gnome Evolution 2.22.1
Gnome Evolution
2.6
CVSSv2
CVE-2006-2789
Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote malicious users to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-ad...
Gnome Evolution 2.3.4
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6
Gnome Evolution 2.3.6.1
Gnome Evolution 2.3.1
Gnome Evolution 2.3.3
Gnome Evolution 2.3.7
Gnome Evolution 2.3.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started