Neomutt

Neomutt

21 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 12.11.2024 03:15:03
  • Last modified 14.11.2024 13:33:35

In mutt and neomutt, PGP encryption does not use the --hidden-recipient mode which may leak the Bcc email header field by inferring from the recipients info.

  • EPSS 0.07%
  • Published 12.11.2024 03:15:03
  • Last modified 14.11.2024 13:38:04

In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender.

  • EPSS 0.07%
  • Published 12.11.2024 02:15:18
  • Last modified 16.07.2025 12:15:22

In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.

  • EPSS 0.53%
  • Published 05.05.2021 16:15:08
  • Last modified 21.11.2024 06:06:46

Mutt 1.11.0 through 2.0.x before 2.0.7 (and NeoMutt 2019-10-25 through 2021-05-04) has a $imap_qresync issue in which imap/util.c has an out-of-bounds read in situations where an IMAP sequence set ends with a comma. NOTE: the $imap_qresync setting fo...

  • EPSS 0.25%
  • Published 23.11.2020 19:15:11
  • Last modified 21.11.2024 05:23:14

Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. ...

  • EPSS 10.15%
  • Published 21.06.2020 17:15:09
  • Last modified 21.11.2024 05:04:30

Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates i...

  • EPSS 0.36%
  • Published 17.07.2018 17:29:01
  • Last modified 21.11.2024 03:48:55

An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.

  • EPSS 4.08%
  • Published 17.07.2018 17:29:00
  • Last modified 21.11.2024 03:48:54

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.

  • EPSS 4.42%
  • Published 17.07.2018 17:29:00
  • Last modified 21.11.2024 03:48:55

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.

  • EPSS 0.55%
  • Published 17.07.2018 17:29:00
  • Last modified 21.11.2024 03:48:55

An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.