Show filters
3 Total Results
Displaying 1-3 of 3
Sort by:
Attacker Value
Unknown

CVE-2023-34204

Disclosure Date: May 30, 2023 (last updated October 08, 2023)
imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it.
Attacker Value
Unknown

CVE-2013-4279

Disclosure Date: April 18, 2014 (last updated October 05, 2023)
imapsync 1.564 and earlier performs a release check by default, which sends sensitive information (imapsync, operating system, and Perl version) to the developer's site.
0
Attacker Value
Unknown

CVE-2014-2014

Disclosure Date: April 18, 2014 (last updated October 05, 2023)
imapsync before 1.584, when running with the --tls option, attempts a cleartext login when a certificate verification failure occurs, which allows remote attackers to obtain credentials by sniffing the network.
0