Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kmail - vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-0481
Buffer overflow in KDE Kmail allows a remote malicious user to cause a denial of service via an attachment with a long file name.
Kde K-mail 1.0.26
Kde K-mail 1.0.23
Kde K-mail 1.0.24
Kde K-mail 1.0.25
Kde K-mail 1.0.27
Kde K-mail 1.0.29.1
Kde K-mail 1.0.29
Kde K-mail 1.0.28
4.6
CVSSv2
CVE-1999-1270
KMail in KDE 1.0 provides a PGP passphrase as a command line argument to other programs, which could allow local users to obtain the passphrase and compromise the PGP keys of other users by viewing the arguments via programs that list process information, such as ps.
Kde Kde 1.0
4
CVSSv2
CVE-2021-31855
KDE Messagelib up to and including 5.17.0 reveals cleartext of encrypted messages in some situations. Deleting an attachment of a decrypted encrypted message stored on a remote server (e.g., an IMAP server) causes KMail to upload the decrypted content of the message to the remote...
Kde Messagelib
4.3
CVSSv2
CVE-2006-6660
The nodeType function in KDE libkhtml 4.2.0 and previous versions, as used by Konquerer, KMail, and other programs, allows remote malicious users to cause a denial of service (crash) via malformed HTML tags, possibly involving a COL SPAN tag embedded in a RANGE tag.
Kde Libkhtml
2 EDB exploits
5
CVSSv2
CVE-2002-0342
Kmail 1.2 on KDE 2.1.1 allows remote malicious users to cause a denial of service (crash) via an email message whose body is approximately 55 K long.
Kde K-mail 1.2
NA
CVE-2023-52723
In KDE libksieve prior to 23.03.80, kmanagesieve/session.cpp places a cleartext password in server logs because a username variable is accidentally given a password value.
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30078
CVE-2024-37896
code injection
CVE-2024-3080
CVE-2024-5172
cross-site request forgery
CVE-2024-6111
firmware
CVE-2024-38504
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2