Show filters
18 Total Results
Displaying 1-10 of 18
Sort by:
Attacker Value
Unknown
CVE-2022-46821
Disclosure Date: November 07, 2023 (last updated November 17, 2023)
Improper Neutralization of Formula Elements in a CSV File vulnerability in Jackmail & Sarbacane Emails & Newsletters with Jackmail.This issue affects Emails & Newsletters with Jackmail: from n/a through 1.2.22.
0
Attacker Value
Unknown
CVE-2021-38373
Disclosure Date: August 10, 2021 (last updated November 28, 2024)
In KDE KMail 19.12.3 (aka 5.13.3), the SMTP STARTTLS option is not honored (and cleartext messages are sent) unless "Server requires authentication" is checked.
0
Attacker Value
Unknown
CVE-2020-15954
Disclosure Date: July 27, 2020 (last updated February 21, 2025)
KDE KMail 19.12.3 (aka 5.13.3) engages in unencrypted POP3 communication during times when the UI indicates that encryption is in use.
0
Attacker Value
Unknown
CVE-2020-11880
Disclosure Date: April 17, 2020 (last updated February 21, 2025)
An issue was discovered in KDE KMail before 19.12.3. By using the proprietary (non-RFC6068) "mailto?attach=..." parameter, a website (or other source of mailto links) can make KMail attach local files to a composed email message without showing a warning to the user, as demonstrated by an attach=.bash_history value.
0
Attacker Value
Unknown
CVE-2019-10732
Disclosure Date: April 07, 2019 (last updated November 27, 2024)
In KDE KMail 5.2.3, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.
0
Attacker Value
Unknown
CVE-2017-17689
Disclosure Date: May 16, 2018 (last updated November 26, 2024)
The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
0
Attacker Value
Unknown
CVE-2014-8878
Disclosure Date: September 28, 2017 (last updated November 26, 2024)
KDE KMail does not encrypt attachments in emails when "automatic encryption" is enabled, which allows remote attackers to obtain sensitive information by sniffing the network.
0
Attacker Value
Unknown
CVE-2017-9604
Disclosure Date: June 13, 2017 (last updated November 26, 2024)
KDE kmail before 5.5.2 and messagelib before 5.5.2, as distributed in KDE Applications before 17.04.2, do not ensure that a plugin's sign/encrypt action occurs during use of the Send Later feature, which allows remote attackers to obtain sensitive information by sniffing the network.
0
Attacker Value
Unknown
CVE-2016-7967
Disclosure Date: December 23, 2016 (last updated November 25, 2024)
KMail since version 5.3.0 used a QWebEngine based viewer that had JavaScript enabled. Since the generated html is executed in the local file security context by default access to remote and local URLs was enabled.
0
Attacker Value
Unknown
CVE-2016-7966
Disclosure Date: December 23, 2016 (last updated November 08, 2023)
Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.
0