Type Mail Client Software

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Vendor »

Identifying all affected vendors is a good starting point for an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Product »

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation »

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability »

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector »

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication »

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction »

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index »

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base »

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp »

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB »

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD »

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

Vendor »

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research »

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day »

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today »

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume »

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities »

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Products (53): Balsa, Claws Mail, Claws Mail vCalendar Plugin, claws mail tools, Futomis Cgi Cafe KMail CGI, GNU Mailman, Ipmotor QuarkMail, KDE KMail, KDE Kmail, KDE messagelib, KMail, kmail, Kmail, Lukas Ruf muttprint, Microsoft Outlook Express, Microsoft Outlook Express Book Control, Microsoft Windows Mail, Mozilla Firefox ESR, Mozilla Firfox ESR, Mozilla SeaMonkey, mozilla Thunderbird, Mozilla Thunderbird, Mozilla Thunderbird ESR, mutt, Mutt, Mutt Mail Client, Mutt mail client, mutt mail client, NeoMutt, Opera Mail, Qualcomm Eudora, Qualcomm Eudora Internet Mail Server, Qualcomm Eudora Worldmail, Qualcomm Eudora WorldMail, Qualcomm Eudora Worldmail Server, Qwikmail QwikMail SMTP, Ritlabs The Bat!, RITLabs The Bat, Ritlabs The Bat, RoundCube, Roundcube webmail, Roundcube Webmail, RoundCube Webmail, RoundCube Webmail, Roundcube Webmail, Squirrelmail, SquirrelMail, Squirrelmail Address Add Plugin, Squirrelmail Gpg Plugin, Squirrelmail GPG Plugin, Squirrelmail SMIME Plugin, Squirrelmail Vacation plugin, tkmail

PublishedBaseTempVulnerabilityProdExpRemCTICVE
11/24/20203.13.1Mutt/NeoMutt IMAP Server Response cleartext transmissionMutt/NeoMuttNot DefinedOfficial Fix0.05CVE-2020-28896
10/09/20204.74.5Mozilla Thunderbird Microsoft Exchange Autodiscovery cleartext transmissionThunderbirdNot DefinedOfficial Fix0.00CVE-2020-15646
10/01/20207.57.2Mozilla Firefox ESR/Thunderbird Abort Signal use after freeFirefox ESR/ThunderbirdNot DefinedOfficial Fix0.00CVE-2020-15669
08/12/20205.24.6Roundcube Webmail Message Display Stored cross site scriptingRoundcube WebmailNot DefinedOfficial Fix0.07CVE-2020-16145
07/28/20206.96.9Claws Mail IMAP Server imap_scan_tree_recursive recursionClaws MailNot DefinedNot Defined0.05CVE-2020-16094
07/27/20205.15.1KDE KMail POP3 cleartext transmissionKMailNot DefinedNot Defined0.07CVE-2020-15954
07/23/20209.89.4Claws Mail STARTTLS session.c Remote Code ExecutionClaws MailNot DefinedOfficial Fix0.07CVE-2020-15917
07/09/20205.65.4Mozilla Thunderbird STARTTLS missing encryptionThunderbirdNot DefinedOfficial Fix0.00CVE-2020-12398
07/06/20205.24.9Roundcube Webmail Email cross site scriptingRoundcube WebmailNot DefinedOfficial Fix0.04CVE-2020-15562
06/24/20205.35.1GNU Mailman Private Archive Login Page private.py injectionMailmanNot DefinedOfficial Fix0.00CVE-2020-15011
06/21/20205.95.7Mutt/NeoMutt STARTTLS injectionMutt/NeoMuttNot DefinedOfficial Fix0.05CVE-2020-14954
06/20/20209.89.8SquirrelMail compose.php Serialized deserializationSquirrelMailNot DefinedNot Defined0.00CVE-2020-14933
06/20/20209.89.8SquirrelMail compose.php Serialized deserializationSquirrelMailNot DefinedNot Defined0.05CVE-2020-14932
06/15/20204.94.7Mutt GnuTLS improper authenticationMuttNot DefinedOfficial Fix0.00CVE-2020-14154
06/15/20205.95.7Mutt PREAUTH information disclosureMuttNot DefinedOfficial Fix0.00CVE-2020-14093
06/09/20205.24.9Roundcube Webmail XML Attachment cross site scriptingRoundcube WebmailNot DefinedOfficial Fix0.06CVE-2020-13965
06/09/20205.24.9Roundcube Webmail Username Template rcmail_output_html.php cross site scriptingRoundcube WebmailNot DefinedOfficial Fix0.06CVE-2020-13964
05/22/20205.35.1Mozilla Thunderbird Unicode Encoding origin validationThunderbirdNot DefinedOfficial Fix0.00CVE-2020-12397
05/06/20206.46.1GNU Mailman mailman injectionMailmanNot DefinedOfficial Fix0.05CVE-2020-12108
05/04/20208.58.2RoundCube Webmail Config Setting rcube_image.php argument injectionWebmailNot DefinedOfficial Fix0.05CVE-2020-12641
05/04/20208.58.2RoundCube Webmail rcube_plugin_api.php path traversalWebmailNot DefinedOfficial Fix0.05CVE-2020-12640
05/04/20205.04.8RoundCube Webmail cross-site request forgeryWebmailNot DefinedOfficial Fix0.06CVE-2020-12626
05/04/20205.24.9RoundCube Webmail rcube_washtml.php cross site scriptingWebmailNot DefinedOfficial Fix0.06CVE-2020-12625
04/24/20205.24.9GNU Mailman MIME Part cross site scriptingMailmanNot DefinedOfficial Fix0.00CVE-2020-12137
04/17/20205.95.6KDE KMail information disclosureKMailNot DefinedOfficial Fix0.08CVE-2020-11880

Do you want to use VulDB in your project?

Use the official API to access entries easily!