Imapsync Project

Imapsync

3 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.14%
  • Veröffentlicht 30.05.2023 04:15:10
  • Zuletzt bearbeitet 10.01.2025 21:15:12

imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the us...

Exploit
  • EPSS 0.42%
  • Veröffentlicht 18.04.2014 22:14:35
  • Zuletzt bearbeitet 12.04.2025 10:46:40

imapsync 1.564 and earlier performs a release check by default, which sends sensitive information (imapsync, operating system, and Perl version) to the developer's site.

  • EPSS 0.36%
  • Veröffentlicht 18.04.2014 22:14:35
  • Zuletzt bearbeitet 12.04.2025 10:46:40

imapsync before 1.584, when running with the --tls option, attempts a cleartext login when a certificate verification failure occurs, which allows remote attackers to obtain credentials by sniffing the network.