CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “neomutt”

21 vulnerabilities found for “neomutt”

Page 1 of 2

CVE-2024-49395
MEDIUM5.3

In mutt and neomutt, PGP encryption does not use the --hidden-recipient mode which may leak the Bcc email header field by inferring from the recipients info.

mutt / mutt+3
Network
Published Nov 12, 2024
Page 1 of 2
CVE-2024-49394
MEDIUM5.3

In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender.

mutt / mutt+3
Network
Published Nov 12, 2024
CVE-2024-49393
MEDIUM6.5

In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.

mutt / mutt+3
Network
Published Nov 12, 2024
CVE-2021-32055
CRITICAL9.1

Mutt 1.11.0 through 2.0.x before 2.0.7 (and NeoMutt 2019-10-25 through 2021-05-04) has a $imap_qresync issue in which imap/util.c has an out-of-bounds read in situations where an IMAP sequence set ends with a comma. NOTE: the $imap_qresync setting for QRESYNC is not enabled by default.

mutt / mutt+1
Network
Published May 5, 2021
CVE-2020-28896
MEDIUM5.3

Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.

mutt / mutt+2
Network
Published Nov 23, 2020
CVE-2020-14954
MEDIUM5.9

Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."

mutt / mutt+13
Network
Published Jun 21, 2020
CVE-2018-14361
CRITICAL9.8

An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.

debian / debian_linux+2
Network
Published Jul 17, 2018
CVE-2018-14351
CRITICAL9.8

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.

mutt / mutt+4
Network
Published Jul 17, 2018
CVE-2018-14360
CRITICAL9.8

An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.

debian / debian_linux+2
Network
Published Jul 17, 2018
CVE-2018-14359
CRITICAL9.8

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.

mutt / mutt+7
Network
Published Jul 17, 2018
CVE-2018-14355
MEDIUM5.3

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name.

debian / debian_linux+4
Network
Published Jul 17, 2018
CVE-2018-14350
CRITICAL9.8

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.

mutt / mutt+7
Network
Published Jul 17, 2018
CVE-2018-14353
CRITICAL9.8

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.

mutt / mutt+6
Network
Published Jul 17, 2018
CVE-2018-14356
CRITICAL9.8

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.

debian / debian_linux+4
Network
Published Jul 17, 2018
CVE-2018-14357
CRITICAL9.8

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.

mutt / mutt+19
Network
Published Jul 17, 2018
CVE-2018-14352
CRITICAL9.8

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.

mutt / mutt+7
Network
Published Jul 17, 2018
CVE-2018-14362
CRITICAL9.8

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.

mutt / mutt+17
Network
Published Jul 17, 2018
CVE-2018-14354
CRITICAL9.8

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.

mutt / mutt+20
Network
Published Jul 17, 2018
CVE-2018-14349
CRITICAL9.8

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.

debian / debian_linux+4
Network
Published Jul 17, 2018
CVE-2018-14358
CRITICAL9.8

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.

mutt / mutt+6
Network
Published Jul 17, 2018