Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome evolution 2.3.7 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2006-0528
The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote malicious users to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very lon...
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 2.3.5
Gnome Evolution 2.3.7
Gnome Evolution 2.3.1
Gnome Evolution 2.3.2
Gnome Evolution 2.3.6
Gnome Evolution 2.3.6.1
1 EDB exploit
2.6
CVSSv2
CVE-2006-2789
Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote malicious users to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-ad...
Gnome Evolution 2.3.4
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6
Gnome Evolution 2.3.6.1
Gnome Evolution 2.3.1
Gnome Evolution 2.3.3
Gnome Evolution 2.3.7
Gnome Evolution 2.3.2
4.3
CVSSv2
CVE-2011-3201
GNOME Evolution prior to 3.2.3 allows user-assisted remote malicious users to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.
Oracle Solaris 11.2
Gnome Evolution 2.4
Gnome Evolution 2.0.1
Gnome Evolution 2.3.6
Gnome Evolution 1.11
Gnome Evolution 1.5
Gnome Evolution 1.2.4
Gnome Evolution 1.4.5
Gnome Evolution 1.4.6
Gnome Evolution 2.0.2
Gnome Evolution 2.12.3
Gnome Evolution 2.3.5
Gnome Evolution 1.4.4
Gnome Evolution 2.24.5
Gnome Evolution 2.26.1
Gnome Evolution 1.2.1
Gnome Evolution 2.3.2
Gnome Evolution 2.2
Gnome Evolution 2.6
Gnome Evolution 1.0.8
Gnome Evolution 2.22.1
Gnome Evolution
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started