Claws Mail (aka claws-mail) 3.7.2

CPE Details

Claws Mail (aka claws-mail) 3.7.2
3.7.2
2012-10-23
19h03 +00:00
2012-10-23
19h03 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:claws-mail:claws-mail:3.7.2:*:*:*:*:*:*:*

Informations

Vendor

claws-mail

Product

claws-mail

Version

3.7.2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-37746 2021-07-30 11h17 +00:00 textview_uri_security_check in textview.c in Claws Mail before 3.18.0, and Sylpheed through 3.7.0, does not have sufficient link checks before accepting a click.
6.1
Medium
CVE-2020-16094 2020-07-28 16h34 +00:00 In imap_scan_tree_recursive in Claws Mail through 3.17.6, a malicious IMAP server can trigger stack consumption because of unlimited recursion into subdirectories during a rebuild of the folder tree.
7.5
High
CVE-2020-15917 2020-07-23 16h06 +00:00 common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled.
9.8
Critical
CVE-2015-8614 2016-04-11 19h00 +00:00 Multiple stack-based buffer overflows in the (1) conv_jistoeuc, (2) conv_euctojis, and (3) conv_sjistoeuc functions in codeconv.c in Claws Mail before 3.13.1 allow remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion.
7.3
High
CVE-2014-2576 2014-10-15 12h00 +00:00 plugins/rssyl/feed.c in Claws Mail before 3.10.0 disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to spoof servers and conduct man-in-the-middle (MITM) attacks.
6.8