Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu mailutils vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2005-1521
Integer overflow in the fetch_io function of the imap4d server in GNU Mailutils 0.5 and 0.6, and other versions prior to 0.6.90, allows remote malicious users to execute arbitrary code via a partial message request with a large value in the END parameter, which leads to a heap-ba...
Gnu Mailutils 0.5
Gnu Mailutils 0.6
7.5
CVSSv2
CVE-2005-1523
Format string vulnerability in imap4d server in GNU Mailutils 0.5 and 0.6, and other versions prior to 0.6.90, allows remote malicious users to execute arbitrary code via format string specifiers in the command tag for IMAP commands.
Gnu Mailutils 0.5
Gnu Mailutils 0.6
1 EDB exploit
7.5
CVSSv2
CVE-2005-1520
Buffer overflow in the header_get_field_name function in header.c for GNU Mailutils 0.5 and 0.6, and other versions prior to 0.6.90, allows remote malicious users to execute arbitrary code via a crafted e-mail.
Gnu Mailutils 0.5
Gnu Mailutils 0.6
1 EDB exploit
5
CVSSv2
CVE-2005-1522
The imap4d server for GNU Mailutils 0.5 and 0.6, and other versions prior to 0.6.90, allows authenticated remote users to cause a denial of service (CPU consumption) via a large range value in the FETCH command.
Gnu Mailutils 0.6
Gnu Mailutils 0.5
7.2
CVSSv2
CVE-2004-0984
Unknown vulnerability in the dotlock implementation in mailutils prior to 1:0.5-4 on Debian GNU/Linux allows malicious users to gain privileges.
Gnu Mailutils
4.6
CVSSv2
CVE-2019-18862
maidag in GNU Mailutils prior to 3.8 is installed setuid and allows local privilege escalation in the url mode.
Gnu Mailutils
1 EDB exploit
7.5
CVSSv2
CVE-2005-2878
Format string vulnerability in search.c in the imap4d server in GNU Mailutils 0.6 allows remote authenticated users to execute arbitrary code via format string specifiers in the SEARCH command.
Gnu Mailutils 0.6
3 EDB exploits
7.5
CVSSv2
CVE-2005-1824
The sql_escape_string function in auth/sql.c for the mailutils SQL authentication module does not properly quote the "\" (backslash) character, which is used as an escape character and makes the module vulnerable to SQL injection attacks.
Gnu Mailutils 1.0.6.1.1
NA
CVE-2019-188621
GNU Mailutils versions 2.0 through 3.7 suffer from a local privilege escalation vulnerability.
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
firmware
CVE-2023-52866
CVE-2024-4367
CVE-2024-1721
CVE-2023-34992
XML injection
CVE-2023-52817
SQL
CVE-2023-52855
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started