Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome evolution 2.3.4 vulnerabilities and exploits
(subscribe to this query)
231
VMScore
CVE-2006-2789
Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote malicious users to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-ad...
Gnome Evolution 2.3.4
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6
Gnome Evolution 2.3.6.1
Gnome Evolution 2.3.1
Gnome Evolution 2.3.3
Gnome Evolution 2.3.7
Gnome Evolution 2.3.2
505
VMScore
CVE-2006-0528
The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote malicious users to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very lon...
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 2.3.5
Gnome Evolution 2.3.7
Gnome Evolution 2.3.1
Gnome Evolution 2.3.2
Gnome Evolution 2.3.6
Gnome Evolution 2.3.6.1
1 EDB exploit
668
VMScore
CVE-2005-2549
Multiple format string vulnerabilities in Evolution 1.5 up to and including 2.3.6.1 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from...
Gnome Evolution 2.0
Gnome Evolution 2.1
Gnome Evolution 2.3.2
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 1.5
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6.1
Gnome Evolution 2.2
Gnome Evolution 2.3.1
668
VMScore
CVE-2005-2550
Format string vulnerability in Evolution 1.4 up to and including 2.3.6.1 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via the calendar entries such as task lists, which are not properly handled when the user selects the Ca...
Gnome Evolution 1.4
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 2.1
Gnome Evolution 2.2
Gnome Evolution 2.3.1
Gnome Evolution 2.3.2
Gnome Evolution 1.5
Gnome Evolution 2.0
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6.1
383
VMScore
CVE-2011-3201
GNOME Evolution prior to 3.2.3 allows user-assisted remote malicious users to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.
Oracle Solaris 11.2
Gnome Evolution 2.4
Gnome Evolution 2.0.1
Gnome Evolution 2.3.6
Gnome Evolution 1.11
Gnome Evolution 1.5
Gnome Evolution 1.2.4
Gnome Evolution 1.4.5
Gnome Evolution 1.4.6
Gnome Evolution 2.0.2
Gnome Evolution 2.12.3
Gnome Evolution 2.3.5
Gnome Evolution 1.4.4
Gnome Evolution 2.24.5
Gnome Evolution 2.26.1
Gnome Evolution 1.2.1
Gnome Evolution 2.3.2
Gnome Evolution 2.2
Gnome Evolution 2.6
Gnome Evolution 1.0.8
Gnome Evolution 2.22.1
Gnome Evolution
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started