Vulnerabilities (CVE)

Filtered by vendor Kde Subscribe
Filtered by product Kmail
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-38373 1 Kde 1 Kmail 2021-08-20 3.5 LOW 5.3 MEDIUM
In KDE KMail 19.12.3 (aka 5.13.3), the SMTP STARTTLS option is not honored (and cleartext messages are sent) unless "Server requires authentication" is checked.
CVE-2019-10732 1 Kde 1 Kmail 2021-07-21 4.3 MEDIUM 4.3 MEDIUM
In KDE KMail 5.2.3, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.
CVE-2020-15954 2 Debian, Kde 2 Debian Linux, Kmail 2020-07-30 4.3 MEDIUM 6.5 MEDIUM
KDE KMail 19.12.3 (aka 5.13.3) engages in unencrypted POP3 communication during times when the UI indicates that encryption is in use.
CVE-2020-11880 1 Kde 1 Kmail 2020-04-29 6.4 MEDIUM 6.5 MEDIUM
An issue was discovered in KDE KMail before 19.12.3. By using the proprietary (non-RFC6068) "mailto?attach=..." parameter, a website (or other source of mailto links) can make KMail attach local files to a composed email message without showing a warning to the user, as demonstrated by an attach=.bash_history value.
CVE-2017-17689 16 9folders, Apple, Bloop and 13 more 17 Nine, Mail, Airmail and 14 more 2019-10-03 4.3 MEDIUM 5.9 MEDIUM
The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
CVE-2014-8878 1 Kde 1 Kmail 2017-10-06 4.3 MEDIUM 5.9 MEDIUM
KDE KMail does not encrypt attachments in emails when "automatic encryption" is enabled, which allows remote attackers to obtain sensitive information by sniffing the network.
CVE-2016-7968 1 Kde 1 Kmail 2016-12-27 7.5 HIGH 6.5 MEDIUM
KMail since version 5.3.0 used a QWebEngine based viewer that had JavaScript enabled. HTML Mail contents were not sanitized for JavaScript and included code was executed.