Gnu

Mailutils

8 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.72%
  • Published 11.11.2019 16:15:12
  • Last modified 21.11.2024 04:33:44

maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.

Exploit
  • EPSS 57.14%
  • Published 13.09.2005 23:03:00
  • Last modified 03.04.2025 01:03:51

Format string vulnerability in search.c in the imap4d server in GNU Mailutils 0.6 allows remote authenticated users to execute arbitrary code via format string specifiers in the SEARCH command.

  • EPSS 1.24%
  • Published 02.06.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

The sql_escape_string function in auth/sql.c for the mailutils SQL authentication module does not properly quote the "\" (backslash) character, which is used as an escape character and makes the module vulnerable to SQL injection attacks.

  • EPSS 11.33%
  • Published 26.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in the header_get_field_name function in header.c for GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a crafted e-mail.

  • EPSS 4.1%
  • Published 26.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

Integer overflow in the fetch_io function of the imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a partial message request with a large value in the END parameter, wh...

  • EPSS 0.91%
  • Published 26.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

The imap4d server for GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows authenticated remote users to cause a denial of service (CPU consumption) via a large range value in the FETCH command.

  • EPSS 14.09%
  • Published 26.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

Format string vulnerability in imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via format string specifiers in the command tag for IMAP commands.

  • EPSS 0.05%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Unknown vulnerability in the dotlock implementation in mailutils before 1:0.5-4 on Debian GNU/Linux allows attackers to gain privileges.