mutt vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mutt package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Exposure of Sensitive Information Through Metadata

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Improper Verification of Cryptographic Signature

*
  • M
Directory Traversal

<5:1.5.21-29.el7
  • H
Directory Traversal

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • M
Buffer Overflow

*
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Directory Traversal

<5:1.5.21-28.el7_5
  • H
Directory Traversal

<5:1.5.21-28.el7_5
  • H
Directory Traversal

<5:1.5.21-28.el7_5
  • H
Directory Traversal

<5:1.5.21-28.el7_5
  • H
Directory Traversal

<5:1.5.21-28.el7_5
  • H
Directory Traversal

<5:1.5.21-28.el7_5
  • H
Directory Traversal

<5:1.5.21-28.el7_5
  • H
Directory Traversal

<5:1.5.21-28.el7_5
  • H
Directory Traversal

<5:1.5.21-28.el7_5
  • H
Directory Traversal

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • H
Improper Input Validation

<5:1.5.21-28.el7_5
  • M
Directory Traversal

<5:1.5.21-29.el7
  • L
Improper Input Validation

*
  • L
Heap-based Buffer Overflow

*
  • L
Improper Handling of Length Parameter Inconsistency

*
  • L
Integer Overflow or Wraparound

*
  • L
Incorrect Calculation of Buffer Size

*
  • L
Improper Input Validation

*
  • L
Stack-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • M
Memory Leak

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Arbitrary Command Injection

*
  • M
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • L
Out-of-Bounds

*