Mutt

Mutt

45 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 12.11.2024 03:15:03
  • Last modified 14.11.2024 13:33:35

In mutt and neomutt, PGP encryption does not use the --hidden-recipient mode which may leak the Bcc email header field by inferring from the recipients info.

  • EPSS 0.07%
  • Published 12.11.2024 03:15:03
  • Last modified 14.11.2024 13:38:04

In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender.

  • EPSS 0.07%
  • Published 12.11.2024 02:15:18
  • Last modified 16.07.2025 12:15:22

In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.

  • EPSS 0.03%
  • Published 09.09.2023 15:15:35
  • Last modified 21.11.2024 08:36:10

Null pointer dereference when composing from a specially crafted draft message in Mutt >1.5.2 <2.2.12

  • EPSS 0.08%
  • Published 09.09.2023 15:15:34
  • Last modified 21.11.2024 08:36:09

Null pointer dereference when viewing a specially crafted email in Mutt >1.5.2 <2.2.12

Exploit
  • EPSS 0.16%
  • Published 14.04.2022 21:15:08
  • Last modified 21.11.2024 06:40:29

Buffer Overflow in uudecoder in Mutt affecting all versions starting from 0.94.13 before 2.2.3 allows read past end of input line

  • EPSS 0.53%
  • Published 05.05.2021 16:15:08
  • Last modified 21.11.2024 06:06:46

Mutt 1.11.0 through 2.0.x before 2.0.7 (and NeoMutt 2019-10-25 through 2021-05-04) has a $imap_qresync issue in which imap/util.c has an out-of-bounds read in situations where an IMAP sequence set ends with a comma. NOTE: the $imap_qresync setting fo...

  • EPSS 2.21%
  • Published 19.01.2021 15:15:12
  • Last modified 21.11.2024 06:21:04

rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email me...

  • EPSS 0.25%
  • Published 23.11.2020 19:15:11
  • Last modified 21.11.2024 05:23:14

Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. ...

  • EPSS 10.15%
  • Published 21.06.2020 17:15:09
  • Last modified 21.11.2024 05:04:30

Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates i...