Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4196-1 | kmail-account-wizard security update |
Ubuntu USN |
USN-7729-1 | KDE PIM vulnerabilities |
Ubuntu USN |
USN-7732-1 | KMail Account Wizard vulnerability |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 31 May 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 30 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kde
Kde kmail |
|
| Weaknesses | CWE-319 | |
| CPEs | cpe:2.3:a:kde:kmail:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Kde
Kde kmail |
|
| Metrics |
cvssV3_1
|
Mon, 28 Oct 2024 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle attackers to trigger use of an attacker-controlled mail server because cleartext HTTP is used for a URL such as http://autoconfig.example.com or http://example.com/.well-known/autoconfig for retrieving the configuration. This is related to kmail-account-wizard. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-31T08:03:29.146Z
Reserved: 2024-10-27T00:00:00.000Z
Link: CVE-2024-50624
Updated: 2025-05-31T08:03:29.146Z
Status : Deferred
Published: 2024-10-28T00:15:03.720
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-50624
No data.
OpenCVE Enrichment
No data.
Debian DLA
Ubuntu USN