Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kde kmail - vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2000-0481
Buffer overflow in KDE Kmail allows a remote malicious user to cause a denial of service via an attachment with a long file name.
Kde K-mail 1.0.26
Kde K-mail 1.0.23
Kde K-mail 1.0.24
Kde K-mail 1.0.25
Kde K-mail 1.0.27
Kde K-mail 1.0.29.1
Kde K-mail 1.0.29
Kde K-mail 1.0.28
409
VMScore
CVE-1999-1270
KMail in KDE 1.0 provides a PGP passphrase as a command line argument to other programs, which could allow local users to obtain the passphrase and compromise the PGP keys of other users by viewing the arguments via programs that list process information, such as ps.
Kde Kde 1.0
356
VMScore
CVE-2021-31855
KDE Messagelib up to and including 5.17.0 reveals cleartext of encrypted messages in some situations. Deleting an attachment of a decrypted encrypted message stored on a remote server (e.g., an IMAP server) causes KMail to upload the decrypted content of the message to the remote...
Kde Messagelib
440
VMScore
CVE-2006-6660
The nodeType function in KDE libkhtml 4.2.0 and previous versions, as used by Konquerer, KMail, and other programs, allows remote malicious users to cause a denial of service (crash) via malformed HTML tags, possibly involving a COL SPAN tag embedded in a RANGE tag.
Kde Libkhtml
2 EDB exploits
445
VMScore
CVE-2002-0342
Kmail 1.2 on KDE 2.1.1 allows remote malicious users to cause a denial of service (crash) via an email message whose body is approximately 55 K long.
Kde K-mail 1.2
NA
CVE-2023-52723
In KDE libksieve prior to 23.03.80, kmanagesieve/session.cpp places a cleartext password in server logs because a username variable is accidentally given a password value.
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2