Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1766-1 | evolution security update |
Debian DSA |
DSA-4457-1 | evolution security update |
EUVD |
EUVD-2018-7461 | GNOME Evolution through 3.28.2 is prone to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment. |
Ubuntu USN |
USN-3998-1 | Evolution Data Server vulnerability |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T10:01:54.662Z
Reserved: 2018-08-20T00:00:00.000Z
Link: CVE-2018-15587
No data.
Status : Modified
Published: 2019-02-11T17:29:00.270
Modified: 2024-11-21T03:51:07.370
Link: CVE-2018-15587
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN