3 results (0.011 seconds)

CVSS: 7.8EPSS: 3%CPEs: 26EXPL: 0

KMail 1.9.5 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents KMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection. KMail 1.9.5 y anteriores no utiliza adecuadamente el argumento --status-fd al invocar a GnuPG, lo cual provoca que KMail no distinga visualmente entre trozos firmados y no firmados de mensajes OpenPGP con múltiples componentes, lo cual permite a atacantes remotos falsificar el contenido de un mensaje si ser detectado. • http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html http://secunia.com/advisories/24413 http://securityreason.com/securityalert/2353 http://www.coresecurity.com/?action=item&id=1687 http://www.securityfocus.com/archive/1/461958/100/0/threaded http://www.securityfocus.com/archive/1/461958/30/7710/threaded http://www.securityfocus.com/bid/22759 http://www.securitytracker.com/id?1017727 http://www.vupen.com/english/advisories/2007/0835 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 2

KDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories. • https://www.exploit-db.com/exploits/19240 http://www.redhat.com/support/errata/RHSA1999015_01.html http://www.securityfocus.com/bid/300 •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Buffer overflow in KDE Kmail allows a remote attacker to cause a denial of service via an attachment with a long file name. • http://securityfocus.com/templates/archive.pike?list=82&date=2000-06-22&msg=00060200422401.01667%40lez http://www.securityfocus.com/bid/1380 https://exchange.xforce.ibmcloud.com/vulnerabilities/4993 •