Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome evolution vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-3533
Format string vulnerability in the window_error function in yelp-window.c in yelp in Gnome after 2.19.90 and prior to 2.24 allows remote malicious users to execute arbitrary code via format string specifiers in an invalid URI on the command line, as demonstrated by use of yelp wi...
Gnome Yelp
Gnome Gnome 2.20
Gnome Gnome 2.22
1 EDB exploit
9.3
CVSSv2
CVE-2008-1109
Heap-based buffer overflow in Evolution 2.22.1 allows user-assisted remote malicious users to execute arbitrary code via a long DESCRIPTION property in an iCalendar attachment, which is not properly handled during a reply in the calendar view (aka the Calendars window).
Gnome Evolution 2.22.1
7.6
CVSSv2
CVE-2008-1108
Buffer overflow in Evolution 2.22.1, when the ITip Formatter plugin is disabled, allows remote malicious users to execute arbitrary code via a long timezone string in an iCalendar attachment.
Gnome Evolution 2.2.1
7.5
CVSSv2
CVE-2018-12422
addressbook/backends/ldap/e-book-backend-ldap.c in Evolution-Data-Server in GNOME Evolution up to and including 3.29.2 might allow malicious users to trigger a Buffer Overflow via a long query that is processed by the strcat function. NOTE: the software maintainer disputes this b...
Gnome Evolution
7.5
CVSSv2
CVE-2005-2549
Multiple format string vulnerabilities in Evolution 1.5 up to and including 2.3.6.1 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from...
Gnome Evolution 2.0
Gnome Evolution 2.1
Gnome Evolution 2.3.2
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 1.5
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6.1
Gnome Evolution 2.2
Gnome Evolution 2.3.1
7.5
CVSSv2
CVE-2005-2550
Format string vulnerability in Evolution 1.4 up to and including 2.3.6.1 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via the calendar entries such as task lists, which are not properly handled when the user selects the Ca...
Gnome Evolution 1.4
Gnome Evolution 2.3.3
Gnome Evolution 2.3.4
Gnome Evolution 2.1
Gnome Evolution 2.2
Gnome Evolution 2.3.1
Gnome Evolution 2.3.2
Gnome Evolution 1.5
Gnome Evolution 2.0
Gnome Evolution 2.3.5
Gnome Evolution 2.3.6.1
7.2
CVSSv2
CVE-2005-0102
Integer overflow in camel-lock-helper in Evolution 2.0.2 and previous versions allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
Gnome Evolution
Debian Debian Linux 3.0
6.8
CVSSv2
CVE-2009-3721
Multiple directory traversal and buffer overflow vulnerabilities were discovered in yTNEF, and in Evolution's TNEF parser that is derived from yTNEF. A crafted email could cause these applications to write data in arbitrary locations on the filesystem, crash, or potentially ...
Gnome Evolution
Ytnef Project Ytnef
6.8
CVSSv2
CVE-2008-0072
Format string vulnerability in the emf_multipart_encrypted function in mail/em-format.c in Evolution 2.12.3 and previous versions allows remote malicious users to execute arbitrary code via a crafted encrypted message, as demonstrated using the Version field.
Gnome Evolution
6.8
CVSSv2
CVE-2007-3257
Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.
Gnome Evolution 1.11
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »