Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2020-14093
Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.014
EPSS Ranking
79.3%
CVSS Severity
CVSS v3 Score
5.9
CVSS v2 Score
4.3
References
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html
http://www.mutt.org
https://bugs.gentoo.org/728300
https://github.com/muttmua/mutt/commit/3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01
https://lists.debian.org/debian-lts-announce/2020/06/msg00039.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00040.html
https://security.gentoo.org/glsa/202007-57
https://usn.ubuntu.com/4401-1/
https://www.debian.org/security/2020/dsa-4707
https://www.debian.org/security/2020/dsa-4708
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html
http://www.mutt.org
https://bugs.gentoo.org/728300
https://github.com/muttmua/mutt/commit/3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01
https://lists.debian.org/debian-lts-announce/2020/06/msg00039.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00040.html
https://security.gentoo.org/glsa/202007-57
https://usn.ubuntu.com/4401-1/
https://www.debian.org/security/2020/dsa-4707
https://www.debian.org/security/2020/dsa-4708
Products affected by CVE-2020-14093
Mutt
»
Mutt
»
Version:
1.10.1
cpe:2.3:a:mutt:mutt:1.10.1
Mutt
»
Mutt
»
Version:
1.11.0
cpe:2.3:a:mutt:mutt:1.11.0
Mutt
»
Mutt
»
Version:
1.11.1
cpe:2.3:a:mutt:mutt:1.11.1
Mutt
»
Mutt
»
Version:
1.11.2
cpe:2.3:a:mutt:mutt:1.11.2
Mutt
»
Mutt
»
Version:
1.11.3
cpe:2.3:a:mutt:mutt:1.11.3
Mutt
»
Mutt
»
Version:
1.11.4
cpe:2.3:a:mutt:mutt:1.11.4
Mutt
»
Mutt
»
Version:
1.12.0
cpe:2.3:a:mutt:mutt:1.12.0
Mutt
»
Mutt
»
Version:
1.12.1
cpe:2.3:a:mutt:mutt:1.12.1
Mutt
»
Mutt
»
Version:
1.12.2
cpe:2.3:a:mutt:mutt:1.12.2
Mutt
»
Mutt
»
Version:
1.13.0
cpe:2.3:a:mutt:mutt:1.13.0
Mutt
»
Mutt
»
Version:
1.13.1
cpe:2.3:a:mutt:mutt:1.13.1
Mutt
»
Mutt
»
Version:
1.13.2
cpe:2.3:a:mutt:mutt:1.13.2
Mutt
»
Mutt
»
Version:
1.13.3
cpe:2.3:a:mutt:mutt:1.13.3
Mutt
»
Mutt
»
Version:
1.13.4
cpe:2.3:a:mutt:mutt:1.13.4
Mutt
»
Mutt
»
Version:
1.13.5
cpe:2.3:a:mutt:mutt:1.13.5
Mutt
»
Mutt
»
Version:
1.14.0
cpe:2.3:a:mutt:mutt:1.14.0
Mutt
»
Mutt
»
Version:
1.14.1
cpe:2.3:a:mutt:mutt:1.14.1
Mutt
»
Mutt
»
Version:
1.14.2
cpe:2.3:a:mutt:mutt:1.14.2
Mutt
»
Mutt
»
Version:
1.5
cpe:2.3:a:mutt:mutt:1.5
Mutt
»
Mutt
»
Version:
1.5.1
cpe:2.3:a:mutt:mutt:1.5.1
Mutt
»
Mutt
»
Version:
1.5.10
cpe:2.3:a:mutt:mutt:1.5.10
Mutt
»
Mutt
»
Version:
1.5.11
cpe:2.3:a:mutt:mutt:1.5.11
Mutt
»
Mutt
»
Version:
1.5.12
cpe:2.3:a:mutt:mutt:1.5.12
Mutt
»
Mutt
»
Version:
1.5.13
cpe:2.3:a:mutt:mutt:1.5.13
Mutt
»
Mutt
»
Version:
1.5.14
cpe:2.3:a:mutt:mutt:1.5.14
Mutt
»
Mutt
»
Version:
1.5.15
cpe:2.3:a:mutt:mutt:1.5.15
Mutt
»
Mutt
»
Version:
1.5.16
cpe:2.3:a:mutt:mutt:1.5.16
Mutt
»
Mutt
»
Version:
1.5.17
cpe:2.3:a:mutt:mutt:1.5.17
Mutt
»
Mutt
»
Version:
1.5.18
cpe:2.3:a:mutt:mutt:1.5.18
Mutt
»
Mutt
»
Version:
1.5.19
cpe:2.3:a:mutt:mutt:1.5.19
Mutt
»
Mutt
»
Version:
1.5.2
cpe:2.3:a:mutt:mutt:1.5.2
Mutt
»
Mutt
»
Version:
1.5.20
cpe:2.3:a:mutt:mutt:1.5.20
Mutt
»
Mutt
»
Version:
1.5.20-7
cpe:2.3:a:mutt:mutt:1.5.20-7
Mutt
»
Mutt
»
Version:
1.5.21
cpe:2.3:a:mutt:mutt:1.5.21
Mutt
»
Mutt
»
Version:
1.5.22
cpe:2.3:a:mutt:mutt:1.5.22
Mutt
»
Mutt
»
Version:
1.5.3
cpe:2.3:a:mutt:mutt:1.5.3
Mutt
»
Mutt
»
Version:
1.5.4
cpe:2.3:a:mutt:mutt:1.5.4
Mutt
»
Mutt
»
Version:
1.5.5
cpe:2.3:a:mutt:mutt:1.5.5
Mutt
»
Mutt
»
Version:
1.5.6
cpe:2.3:a:mutt:mutt:1.5.6
Mutt
»
Mutt
»
Version:
1.5.7
cpe:2.3:a:mutt:mutt:1.5.7
Mutt
»
Mutt
»
Version:
1.5.8
cpe:2.3:a:mutt:mutt:1.5.8
Mutt
»
Mutt
»
Version:
1.5.9
cpe:2.3:a:mutt:mutt:1.5.9
Canonical
»
Ubuntu Linux
»
Version:
12.04
cpe:2.3:o:canonical:ubuntu_linux:12.04
Canonical
»
Ubuntu Linux
»
Version:
16.04
cpe:2.3:o:canonical:ubuntu_linux:16.04
Canonical
»
Ubuntu Linux
»
Version:
18.04
cpe:2.3:o:canonical:ubuntu_linux:18.04
Canonical
»
Ubuntu Linux
»
Version:
19.10
cpe:2.3:o:canonical:ubuntu_linux:19.10
Canonical
»
Ubuntu Linux
»
Version:
20.04
cpe:2.3:o:canonical:ubuntu_linux:20.04
Debian
»
Debian Linux
»
Version:
10.0
cpe:2.3:o:debian:debian_linux:10.0
Debian
»
Debian Linux
»
Version:
8.0
cpe:2.3:o:debian:debian_linux:8.0
Debian
»
Debian Linux
»
Version:
9.0
cpe:2.3:o:debian:debian_linux:9.0
Opensuse
»
Leap
»
Version:
15.1
cpe:2.3:o:opensuse:leap:15.1
Opensuse
»
Leap
»
Version:
15.2
cpe:2.3:o:opensuse:leap:15.2
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved