OPENSUSE-SU-2024:11069-1

Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00
Summary
mutt-2.0.7-2.2 on GA media
Severity
Moderate
Notes
Title of the patch: mutt-2.0.7-2.2 on GA media
Description of the patch: These are all security issues fixed in the mutt-2.0.7-2.2 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-11069
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/o… self
https://www.suse.com/security/cve/CVE-2007-1558/ self
https://www.suse.com/security/cve/CVE-2018-14349/ self
https://www.suse.com/security/cve/CVE-2018-14350/ self
https://www.suse.com/security/cve/CVE-2018-14351/ self
https://www.suse.com/security/cve/CVE-2018-14352/ self
https://www.suse.com/security/cve/CVE-2018-14353/ self
https://www.suse.com/security/cve/CVE-2018-14354/ self
https://www.suse.com/security/cve/CVE-2018-14355/ self
https://www.suse.com/security/cve/CVE-2018-14356/ self
https://www.suse.com/security/cve/CVE-2018-14357/ self
https://www.suse.com/security/cve/CVE-2018-14358/ self
https://www.suse.com/security/cve/CVE-2018-14359/ self
https://www.suse.com/security/cve/CVE-2018-14360/ self
https://www.suse.com/security/cve/CVE-2018-14361/ self
https://www.suse.com/security/cve/CVE-2018-14362/ self
https://www.suse.com/security/cve/CVE-2018-14363/ self
https://www.suse.com/security/cve/CVE-2020-14093/ self
https://www.suse.com/security/cve/CVE-2020-14954/ self
https://www.suse.com/security/cve/CVE-2020-28896/ self
https://www.suse.com/security/cve/CVE-2021-3181/ self
https://www.suse.com/security/cve/CVE-2021-32055/ self
https://www.suse.com/security/cve/CVE-2007-1558 external
https://bugzilla.suse.com/262450 external
https://bugzilla.suse.com/271197 external
https://bugzilla.suse.com/279843 external
https://bugzilla.suse.com/281321 external
https://bugzilla.suse.com/281323 external
https://www.suse.com/security/cve/CVE-2018-14349 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101589 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14350 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101588 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14351 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101583 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14352 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101582 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14353 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101581 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14354 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101578 external
https://bugzilla.suse.com/1101581 external
https://bugzilla.suse.com/1101589 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14355 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101577 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14356 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101576 external
https://bugzilla.suse.com/1101589 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14357 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101573 external
https://bugzilla.suse.com/1101581 external
https://bugzilla.suse.com/1101589 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14358 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101571 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14359 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101570 external
https://bugzilla.suse.com/1101589 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14360 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101569 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14361 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101568 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14362 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101567 external
https://bugzilla.suse.com/1101589 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2018-14363 external
https://bugzilla.suse.com/1101428 external
https://bugzilla.suse.com/1101566 external
https://bugzilla.suse.com/1101593 external
https://www.suse.com/security/cve/CVE-2020-14093 external
https://bugzilla.suse.com/1172906 external
https://bugzilla.suse.com/1172935 external
https://www.suse.com/security/cve/CVE-2020-14954 external
https://bugzilla.suse.com/1173197 external
https://www.suse.com/security/cve/CVE-2020-28896 external
https://bugzilla.suse.com/1179035 external
https://www.suse.com/security/cve/CVE-2021-3181 external
https://bugzilla.suse.com/1181221 external
https://bugzilla.suse.com/1181505 external
https://www.suse.com/security/cve/CVE-2021-32055 external
https://bugzilla.suse.com/1185705 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "mutt-2.0.7-2.2 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the mutt-2.0.7-2.2 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-11069",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11069-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2007-1558 page",
        "url": "https://www.suse.com/security/cve/CVE-2007-1558/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14349 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14349/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14350 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14350/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14351 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14351/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14352 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14352/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14353 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14353/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14354 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14354/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14355 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14355/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14356 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14356/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14357 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14357/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14358 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14358/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14359 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14359/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14360 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14360/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14361 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14361/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14362 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14362/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14363 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14363/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14093 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14093/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14954 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14954/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-28896 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-28896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3181 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3181/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-32055 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-32055/"
      }
    ],
    "title": "mutt-2.0.7-2.2 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:11069-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mutt-2.0.7-2.2.aarch64",
                "product": {
                  "name": "mutt-2.0.7-2.2.aarch64",
                  "product_id": "mutt-2.0.7-2.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "mutt-doc-2.0.7-2.2.aarch64",
                "product": {
                  "name": "mutt-doc-2.0.7-2.2.aarch64",
                  "product_id": "mutt-doc-2.0.7-2.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "mutt-lang-2.0.7-2.2.aarch64",
                "product": {
                  "name": "mutt-lang-2.0.7-2.2.aarch64",
                  "product_id": "mutt-lang-2.0.7-2.2.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mutt-2.0.7-2.2.ppc64le",
                "product": {
                  "name": "mutt-2.0.7-2.2.ppc64le",
                  "product_id": "mutt-2.0.7-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "mutt-doc-2.0.7-2.2.ppc64le",
                "product": {
                  "name": "mutt-doc-2.0.7-2.2.ppc64le",
                  "product_id": "mutt-doc-2.0.7-2.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "mutt-lang-2.0.7-2.2.ppc64le",
                "product": {
                  "name": "mutt-lang-2.0.7-2.2.ppc64le",
                  "product_id": "mutt-lang-2.0.7-2.2.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mutt-2.0.7-2.2.s390x",
                "product": {
                  "name": "mutt-2.0.7-2.2.s390x",
                  "product_id": "mutt-2.0.7-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "mutt-doc-2.0.7-2.2.s390x",
                "product": {
                  "name": "mutt-doc-2.0.7-2.2.s390x",
                  "product_id": "mutt-doc-2.0.7-2.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "mutt-lang-2.0.7-2.2.s390x",
                "product": {
                  "name": "mutt-lang-2.0.7-2.2.s390x",
                  "product_id": "mutt-lang-2.0.7-2.2.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mutt-2.0.7-2.2.x86_64",
                "product": {
                  "name": "mutt-2.0.7-2.2.x86_64",
                  "product_id": "mutt-2.0.7-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "mutt-doc-2.0.7-2.2.x86_64",
                "product": {
                  "name": "mutt-doc-2.0.7-2.2.x86_64",
                  "product_id": "mutt-doc-2.0.7-2.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "mutt-lang-2.0.7-2.2.x86_64",
                "product": {
                  "name": "mutt-lang-2.0.7-2.2.x86_64",
                  "product_id": "mutt-lang-2.0.7-2.2.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mutt-2.0.7-2.2.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64"
        },
        "product_reference": "mutt-2.0.7-2.2.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mutt-2.0.7-2.2.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le"
        },
        "product_reference": "mutt-2.0.7-2.2.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mutt-2.0.7-2.2.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x"
        },
        "product_reference": "mutt-2.0.7-2.2.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mutt-2.0.7-2.2.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64"
        },
        "product_reference": "mutt-2.0.7-2.2.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mutt-doc-2.0.7-2.2.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64"
        },
        "product_reference": "mutt-doc-2.0.7-2.2.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mutt-doc-2.0.7-2.2.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le"
        },
        "product_reference": "mutt-doc-2.0.7-2.2.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mutt-doc-2.0.7-2.2.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x"
        },
        "product_reference": "mutt-doc-2.0.7-2.2.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mutt-doc-2.0.7-2.2.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64"
        },
        "product_reference": "mutt-doc-2.0.7-2.2.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mutt-lang-2.0.7-2.2.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64"
        },
        "product_reference": "mutt-lang-2.0.7-2.2.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mutt-lang-2.0.7-2.2.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le"
        },
        "product_reference": "mutt-lang-2.0.7-2.2.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mutt-lang-2.0.7-2.2.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x"
        },
        "product_reference": "mutt-lang-2.0.7-2.2.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mutt-lang-2.0.7-2.2.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        },
        "product_reference": "mutt-lang-2.0.7-2.2.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2007-1558",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2007-1558"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions.  NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2007-1558",
          "url": "https://www.suse.com/security/cve/CVE-2007-1558"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 262450 for CVE-2007-1558",
          "url": "https://bugzilla.suse.com/262450"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 271197 for CVE-2007-1558",
          "url": "https://bugzilla.suse.com/271197"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 279843 for CVE-2007-1558",
          "url": "https://bugzilla.suse.com/279843"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 281321 for CVE-2007-1558",
          "url": "https://bugzilla.suse.com/281321"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 281323 for CVE-2007-1558",
          "url": "https://bugzilla.suse.com/281323"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2007-1558"
    },
    {
      "cve": "CVE-2018-14349",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14349"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14349",
          "url": "https://www.suse.com/security/cve/CVE-2018-14349"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14349",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101589 for CVE-2018-14349",
          "url": "https://bugzilla.suse.com/1101589"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14349",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-14349"
    },
    {
      "cve": "CVE-2018-14350",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14350"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14350",
          "url": "https://www.suse.com/security/cve/CVE-2018-14350"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14350",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101588 for CVE-2018-14350",
          "url": "https://bugzilla.suse.com/1101588"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14350",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-14350"
    },
    {
      "cve": "CVE-2018-14351",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14351"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14351",
          "url": "https://www.suse.com/security/cve/CVE-2018-14351"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14351",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101583 for CVE-2018-14351",
          "url": "https://bugzilla.suse.com/1101583"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14351",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-14351"
    },
    {
      "cve": "CVE-2018-14352",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14352"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14352",
          "url": "https://www.suse.com/security/cve/CVE-2018-14352"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14352",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101582 for CVE-2018-14352",
          "url": "https://bugzilla.suse.com/1101582"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14352",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-14352"
    },
    {
      "cve": "CVE-2018-14353",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14353"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14353",
          "url": "https://www.suse.com/security/cve/CVE-2018-14353"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14353",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101581 for CVE-2018-14353",
          "url": "https://bugzilla.suse.com/1101581"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14353",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-14353"
    },
    {
      "cve": "CVE-2018-14354",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14354"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14354",
          "url": "https://www.suse.com/security/cve/CVE-2018-14354"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14354",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101578 for CVE-2018-14354",
          "url": "https://bugzilla.suse.com/1101578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101581 for CVE-2018-14354",
          "url": "https://bugzilla.suse.com/1101581"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101589 for CVE-2018-14354",
          "url": "https://bugzilla.suse.com/1101589"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14354",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2018-14354"
    },
    {
      "cve": "CVE-2018-14355",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14355"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14355",
          "url": "https://www.suse.com/security/cve/CVE-2018-14355"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14355",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101577 for CVE-2018-14355",
          "url": "https://bugzilla.suse.com/1101577"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14355",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-14355"
    },
    {
      "cve": "CVE-2018-14356",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14356"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14356",
          "url": "https://www.suse.com/security/cve/CVE-2018-14356"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14356",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101576 for CVE-2018-14356",
          "url": "https://bugzilla.suse.com/1101576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101589 for CVE-2018-14356",
          "url": "https://bugzilla.suse.com/1101589"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14356",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-14356"
    },
    {
      "cve": "CVE-2018-14357",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14357"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14357",
          "url": "https://www.suse.com/security/cve/CVE-2018-14357"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14357",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101573 for CVE-2018-14357",
          "url": "https://bugzilla.suse.com/1101573"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101581 for CVE-2018-14357",
          "url": "https://bugzilla.suse.com/1101581"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101589 for CVE-2018-14357",
          "url": "https://bugzilla.suse.com/1101589"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14357",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-14357"
    },
    {
      "cve": "CVE-2018-14358",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14358"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14358",
          "url": "https://www.suse.com/security/cve/CVE-2018-14358"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14358",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101571 for CVE-2018-14358",
          "url": "https://bugzilla.suse.com/1101571"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14358",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-14358"
    },
    {
      "cve": "CVE-2018-14359",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14359"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14359",
          "url": "https://www.suse.com/security/cve/CVE-2018-14359"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14359",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101570 for CVE-2018-14359",
          "url": "https://bugzilla.suse.com/1101570"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101589 for CVE-2018-14359",
          "url": "https://bugzilla.suse.com/1101589"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14359",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-14359"
    },
    {
      "cve": "CVE-2018-14360",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14360"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14360",
          "url": "https://www.suse.com/security/cve/CVE-2018-14360"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14360",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101569 for CVE-2018-14360",
          "url": "https://bugzilla.suse.com/1101569"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14360",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2018-14360"
    },
    {
      "cve": "CVE-2018-14361",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14361"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14361",
          "url": "https://www.suse.com/security/cve/CVE-2018-14361"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14361",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101568 for CVE-2018-14361",
          "url": "https://bugzilla.suse.com/1101568"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14361",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2018-14361"
    },
    {
      "cve": "CVE-2018-14362",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14362"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a \u0027/\u0027 character.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14362",
          "url": "https://www.suse.com/security/cve/CVE-2018-14362"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14362",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101567 for CVE-2018-14362",
          "url": "https://bugzilla.suse.com/1101567"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101589 for CVE-2018-14362",
          "url": "https://bugzilla.suse.com/1101589"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14362",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-14362"
    },
    {
      "cve": "CVE-2018-14363",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14363"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict \u0027/\u0027 characters that may have unsafe interaction with cache pathnames.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14363",
          "url": "https://www.suse.com/security/cve/CVE-2018-14363"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101428 for CVE-2018-14363",
          "url": "https://bugzilla.suse.com/1101428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101566 for CVE-2018-14363",
          "url": "https://bugzilla.suse.com/1101566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1101593 for CVE-2018-14363",
          "url": "https://bugzilla.suse.com/1101593"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-14363"
    },
    {
      "cve": "CVE-2020-14093",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14093"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14093",
          "url": "https://www.suse.com/security/cve/CVE-2020-14093"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172906 for CVE-2020-14093",
          "url": "https://bugzilla.suse.com/1172906"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172935 for CVE-2020-14093",
          "url": "https://bugzilla.suse.com/1172935"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-14093"
    },
    {
      "cve": "CVE-2020-14954",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14954"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a \"begin TLS\" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka \"response injection.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14954",
          "url": "https://www.suse.com/security/cve/CVE-2020-14954"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173197 for CVE-2020-14954",
          "url": "https://bugzilla.suse.com/1173197"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-14954"
    },
    {
      "cve": "CVE-2020-28896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-28896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server\u0027s initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-28896",
          "url": "https://www.suse.com/security/cve/CVE-2020-28896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179035 for CVE-2020-28896",
          "url": "https://bugzilla.suse.com/1179035"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-28896"
    },
    {
      "cve": "CVE-2021-3181",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3181"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the victim may then be unable to see email messages from other persons.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3181",
          "url": "https://www.suse.com/security/cve/CVE-2021-3181"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1181221 for CVE-2021-3181",
          "url": "https://bugzilla.suse.com/1181221"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1181505 for CVE-2021-3181",
          "url": "https://bugzilla.suse.com/1181505"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3181"
    },
    {
      "cve": "CVE-2021-32055",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-32055"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Mutt 1.11.0 through 2.0.x before 2.0.7 (and NeoMutt 2019-10-25 through 2021-05-04) has a $imap_qresync issue in which imap/util.c has an out-of-bounds read in situations where an IMAP sequence set ends with a comma. NOTE: the $imap_qresync setting for QRESYNC is not enabled by default.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
          "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-32055",
          "url": "https://www.suse.com/security/cve/CVE-2021-32055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185705 for CVE-2021-32055",
          "url": "https://bugzilla.suse.com/1185705"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
            "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-32055"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…