Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mutt mutt 1.4.2.1 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2006-3242
Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and previous versions allows remote malicious users to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.
Mutt Mutt 1.4.2.1
Mutt Mutt 1.4.2
107
VMScore
CVE-2006-5297
Race condition in the safe_open function in the Mutt mail client 1.5.12 and previous versions, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.
Mutt Mutt 1.2.1
Mutt Mutt 1.2.5
Mutt Mutt 1.3.12.1
Mutt Mutt 1.3.16
Mutt Mutt 1.4.0
Mutt Mutt 1.4.1
Mutt Mutt 0.95.6
Mutt Mutt 1.2.5.5
Mutt Mutt 1.3.12
Mutt Mutt 1.3.27
Mutt Mutt 1.3.28
Mutt Mutt 1.2.5.1
Mutt Mutt 1.2.5.12
Mutt Mutt 1.3.17
Mutt Mutt 1.3.22
Mutt Mutt 1.4.2
Mutt Mutt 1.4.2.1
Mutt Mutt 1.2.5.12 Ol
Mutt Mutt 1.2.5.4
Mutt Mutt 1.3.24
Mutt Mutt 1.3.25
Mutt Mutt 1.5.10
107
VMScore
CVE-2006-5298
The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and previous versions does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mkte...
Mutt Mutt 1.2.1
Mutt Mutt 1.2.5
Mutt Mutt 1.3.12.1
Mutt Mutt 1.3.16
Mutt Mutt 1.4.0
Mutt Mutt 1.4.1
Mutt Mutt 0.95.6
Mutt Mutt 1.2.5.5
Mutt Mutt 1.3.12
Mutt Mutt 1.3.27
Mutt Mutt 1.3.28
Mutt Mutt 1.2.5.1
Mutt Mutt 1.2.5.12
Mutt Mutt 1.3.17
Mutt Mutt 1.3.22
Mutt Mutt 1.4.2
Mutt Mutt 1.4.2.1
Mutt Mutt 1.5.10
Mutt Mutt 1.2.5.12 Ol
Mutt Mutt 1.2.5.4
Mutt Mutt 1.3.24
Mutt Mutt 1.3.25
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started