VYPR

Enigmail

by Enigmail

CVEs (4)

  • CVE-2007-1264Mar 6, 2007
    risk 0.04cvss epss 0.12

    Enigmail 0.94.2 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Enigmail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.

  • CVE-2014-5369Sep 8, 2014
    risk 0.00cvss epss 0.01

    Enigmail 1.7.x before 1.7.2 sends emails in plaintext when encryption is enabled and only BCC recipients are specified, which allows remote attackers to obtain sensitive information by sniffing the network.

  • CVE-2006-5877Feb 23, 2007
    risk 0.00cvss epss 0.01

    The enigmail extension before 0.94.2 does not properly handle large, encrypted file e-mail attachments, which allows remote attackers to cause a denial of service (crash), as demonstrated with Mozilla Thunderbird.

  • CVE-2005-3256Oct 18, 2005
    risk 0.00cvss epss 0.01

    The key selection dialogue in Enigmail before 0.92.1 can incorrectly select a key with a user ID that does not have additional information, which allows parties with that key to decrypt the message.