CVE-2011-3201
08.03.2013, 21:55
GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.Enginsight
| Vendor | Product | Version |
|---|---|---|
| oracle | solaris | 11.2 |
| gnome | evolution | 𝑥 ≤ 3.0.3 |
| gnome | evolution | 1.0.8 |
| gnome | evolution | 1.2 |
| gnome | evolution | 1.2.1 |
| gnome | evolution | 1.2.2 |
| gnome | evolution | 1.2.3 |
| gnome | evolution | 1.2.4 |
| gnome | evolution | 1.4 |
| gnome | evolution | 1.4.3 |
| gnome | evolution | 1.4.4 |
| gnome | evolution | 1.4.5 |
| gnome | evolution | 1.4.6 |
| gnome | evolution | 1.5 |
| gnome | evolution | 1.11 |
| gnome | evolution | 2.0 |
| gnome | evolution | 2.0.0 |
| gnome | evolution | 2.0.1 |
| gnome | evolution | 2.0.2 |
| gnome | evolution | 2.1 |
| gnome | evolution | 2.2 |
| gnome | evolution | 2.2.1 |
| gnome | evolution | 2.3.1 |
| gnome | evolution | 2.3.2 |
| gnome | evolution | 2.3.3 |
| gnome | evolution | 2.3.4 |
| gnome | evolution | 2.3.5 |
| gnome | evolution | 2.3.6 |
| gnome | evolution | 2.3.6.1 |
| gnome | evolution | 2.3.7 |
| gnome | evolution | 2.4 |
| gnome | evolution | 2.4.2.1 |
| gnome | evolution | 2.6 |
| gnome | evolution | 2.8.1 |
| gnome | evolution | 2.10.3 |
| gnome | evolution | 2.12 |
| gnome | evolution | 2.12.3 |
| gnome | evolution | 2.22.1 |
| gnome | evolution | 2.22.3 |
| gnome | evolution | 2.24 |
| gnome | evolution | 2.24.5 |
| gnome | evolution | 2.26.1 |
| gnome | evolution | 2.26.3 |
| gnome | evolution | 2.28.3.1 |
| gnome | evolution | 2.30.3 |
| gnome | evolution | 2.32.3 |
| redhat | enterprise_linux_desktop | 6.0 |
| redhat | enterprise_linux_server | 6.0 |
| redhat | enterprise_linux_workstation | 6.0 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References