Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mutt mutt 1.5.10 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2005-2642
Buffer overflow in the mutt_decode_xbit function in Handler.c for Mutt 1.5.10 allows remote malicious users to execute arbitrary code, possibly due to interactions with libiconv or gettext.
Mutt Mutt 1.5.10
107
VMScore
CVE-2006-5297
Race condition in the safe_open function in the Mutt mail client 1.5.12 and previous versions, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.
Mutt Mutt 1.3.12.1
Mutt Mutt 1.2.5.5
Mutt Mutt 0.95.6
Mutt Mutt 1.3.27
Mutt Mutt 1.4.2.1
Mutt Mutt 1.3.16
Mutt Mutt 1.2.5
Mutt Mutt 1.3.25
Mutt Mutt 1.4.1
Mutt Mutt
Mutt Mutt 1.3.22
Mutt Mutt 1.2.5.12
Mutt Mutt 1.2.5.1
Mutt Mutt 1.2.5.4
Mutt Mutt 1.3.28
Mutt Mutt 1.3.24
Mutt Mutt 1.4.0
Mutt Mutt 1.2.1
Mutt Mutt 1.4.2
Mutt Mutt 1.3.17
Mutt Mutt 1.5.3
Mutt Mutt 1.2.5.12 Ol
107
VMScore
CVE-2006-5298
The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and previous versions does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mkte...
Mutt Mutt 1.3.12.1
Mutt Mutt 1.2.5.5
Mutt Mutt 0.95.6
Mutt Mutt 1.3.27
Mutt Mutt 1.4.2.1
Mutt Mutt 1.3.16
Mutt Mutt 1.2.5
Mutt Mutt 1.3.25
Mutt Mutt 1.4.1
Mutt Mutt
Mutt Mutt 1.3.22
Mutt Mutt 1.2.5.12
Mutt Mutt 1.2.5.1
Mutt Mutt 1.2.5.4
Mutt Mutt 1.3.28
Mutt Mutt 1.3.24
Mutt Mutt 1.4.0
Mutt Mutt 1.2.1
Mutt Mutt 1.4.2
Mutt Mutt 1.3.17
Mutt Mutt 1.5.3
Mutt Mutt 1.2.5.12 Ol
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started