Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde k-mail vulnerabilities and exploits
(subscribe to this query)
2.6
CVSSv2
CVE-2006-7139
Kmail 1.9.1 on KDE 3.5.2, with "Prefer HTML to Plain Text" enabled, allows remote malicious users to cause a denial of service (crash) via an HTML e-mail with certain table and frameset tags that trigger a segmentation fault, possibly involving invalid free or delete op...
Kde K-mail 1.9.1
1 EDB exploit
7.8
CVSSv2
CVE-2007-1265
KMail 1.9.5 and previous versions does not properly use the --status-fd argument when invoking GnuPG, which prevents KMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote malicious users to forge ...
Kde K-mail 1.0.26
Kde K-mail 1.88
Kde K-mail 1.86.2.36
Kde K-mail 1.1
Kde K-mail 1.95
Kde K-mail 1.92
Kde K-mail 1.0.23
Kde K-mail 1.3.1
Kde K-mail 0.0.29.2
Kde K-mail 1.93
Kde K-mail 1.0.24
Kde K-mail 1.0.25
Kde K-mail 1.0.27
Kde K-mail 1.102
Kde K-mail 1.87
Kde K-mail 1.90
Kde K-mail 1.0.29.1
Kde K-mail 1.0.29
Kde K-mail 1.9.1
Kde K-mail 1.0.29.2
Kde K-mail 1.2
Kde K-mail 1.101
5
CVSSv2
CVE-2002-0342
Kmail 1.2 on KDE 2.1.1 allows remote malicious users to cause a denial of service (crash) via an email message whose body is approximately 55 K long.
Kde K-mail 1.2
4.6
CVSSv2
CVE-1999-0735
KDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories.
Kde K-mail
1 EDB exploit
5
CVSSv2
CVE-2000-0481
Buffer overflow in KDE Kmail allows a remote malicious user to cause a denial of service via an attachment with a long file name.
Kde K-mail 1.0.26
Kde K-mail 1.0.23
Kde K-mail 1.0.24
Kde K-mail 1.0.25
Kde K-mail 1.0.27
Kde K-mail 1.0.29.1
Kde K-mail 1.0.29
Kde K-mail 1.0.28
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29824
CVE-2024-30095
CVE-2024-30104
client side
CVE-2024-5840
CVE-2024-34405
unprivileged
wireless
CVE-2024-4577
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started