Vulnerabilites related to mailenable - mailenable_enterprise
Vulnerability from fkie_nvd
Published
2006-06-28 22:05
Modified
2025-04-03 01:03
Severity ?
Summary
The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD302C38-8169-458F-966C-F7D50E3452BD", "versionEndIncluding": "1.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FC28A2B-2E07-42F3-A2D2-B6D73F45EC73", "versionEndIncluding": "1.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D7F1033-3C99-4E4F-8068-910B23C0673F", "versionEndIncluding": "1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "530449CF-D4A5-4F38-8C1D-F088A4C5170A", "versionEndIncluding": "1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DF53C9E-8389-4AF1-881D-A67613CF3B3F", "versionEndIncluding": "1.02", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "5712D941-4D46-4F10-B12E-1FA036ACA6A2", "versionEndIncluding": "1.03", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "358AEB41-C0E6-4A62-A31D-5600CF2056BC", "versionEndIncluding": "1.04", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDBD081D-2E42-44EC-80D4-B602A03339F9", "versionEndIncluding": "1.21", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.004:*:*:*:*:*:*:*", "matchCriteriaId": "D078B497-4C3C-4246-87C5-58DC5EEED452", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.005:*:*:*:*:*:*:*", "matchCriteriaId": "97DD9EC9-1A27-4A96-95A1-086DEA1E3890", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.006:*:*:*:*:*:*:*", "matchCriteriaId": "193959CF-DAF3-4C62-8DB0-660115E1D41B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.007:*:*:*:*:*:*:*", "matchCriteriaId": "8A827A0E-BDF2-4BAB-9F52-0014FE6E4B70", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.008:*:*:*:*:*:*:*", "matchCriteriaId": "82CF54A9-CF50-4B23-8E3A-AFB08F7F98F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.009:*:*:*:*:*:*:*", "matchCriteriaId": "51BA53BA-CDF5-42EC-8D2B-EC24FDF82931", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.010:*:*:*:*:*:*:*", "matchCriteriaId": "F6B1E90C-AA06-4A89-90B3-0E7140F9B8DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "060D809A-C603-4E06-9F57-3C76FEE6F86D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.012:*:*:*:*:*:*:*", "matchCriteriaId": "D53DE94B-0C32-4DDB-B13B-7B05208477AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.013:*:*:*:*:*:*:*", "matchCriteriaId": "1A5EA901-CD07-464B-8EB0-8F845EDABAA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.014:*:*:*:*:*:*:*", "matchCriteriaId": "92B2611A-D7CF-441A-BA60-F27CF28BEB3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.015:*:*:*:*:*:*:*", "matchCriteriaId": "7139C2FC-4DA3-4193-B130-05524EB97C69", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.016:*:*:*:*:*:*:*", "matchCriteriaId": "C78B7FD6-2433-4EAA-8B3E-0507F81D54FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.017:*:*:*:*:*:*:*", "matchCriteriaId": "1B8B058B-F517-46C4-AC05-8EC258E38A75", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF16E400-930E-4845-BB23-ED1217505302", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*", "matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "CFB9A9BE-5EBD-4C06-BB95-942A65D58C68", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "58F246E4-3B8B-475C-9DBE-49503C451EDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.12:*:*:*:*:*:*:*", "matchCriteriaId": "430C8E86-F7CA-4217-A3C1-71CBE5CAB825", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D35AD18C-CA58-4DFC-A60F-49B698607B33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "B219EBD1-B0E9-4599-B633-AA4C227E5854", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.15:*:*:*:*:*:*:*", "matchCriteriaId": "81249BA3-3D1D-4388-BE8D-28AB5CA3AFF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.16:*:*:*:*:*:*:*", "matchCriteriaId": "771D029C-9F4A-41F9-8F86-F1B1BD38B329", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*", "matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*", "matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*", "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*", "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*", "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*", "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*", "matchCriteriaId": "93A9222A-6F22-40BD-8411-69A90E8E46AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*", "matchCriteriaId": "6F4AADE9-F3FB-4272-8026-58FC677D3F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*", "matchCriteriaId": "9DD53801-B8F7-4AE8-BA2B-AC6297340CB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.91:*:*:*:*:*:*:*", "matchCriteriaId": "64D0A401-2FB6-4720-B0AF-550FB71FBAD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.92:*:*:*:*:*:*:*", "matchCriteriaId": "F2057482-7505-472E-8EF4-300B2A26AB7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.93:*:*:*:*:*:*:*", "matchCriteriaId": "AED2AC32-5485-4707-9E15-903BDD556719", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.101:*:*:*:*:*:*:*", "matchCriteriaId": "652E1512-B1B1-44B5-93CF-9C526B95BA38", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.102:*:*:*:*:*:*:*", "matchCriteriaId": "2835FBA2-79E4-4541-913C-21BAD3320D55", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.103:*:*:*:*:*:*:*", "matchCriteriaId": "CD9449E3-1CEA-40AF-BD00-94B56E38AF5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.104:*:*:*:*:*:*:*", "matchCriteriaId": "39724984-2A10-441F-A103-2DFA693F4F19", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.105:*:*:*:*:*:*:*", "matchCriteriaId": "D01DB7FF-7171-43D2-96F3-E5C0AABA4877", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.106:*:*:*:*:*:*:*", "matchCriteriaId": "77B95FCC-55C7-4B44-B8C7-85792C7E91BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.107:*:*:*:*:*:*:*", "matchCriteriaId": "16E07556-02E5-42FA-9338-3176EB2ED536", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.108:*:*:*:*:*:*:*", "matchCriteriaId": "539C5F71-83FC-455C-8180-72C9F1E2C4A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.109:*:*:*:*:*:*:*", "matchCriteriaId": "C1C4D762-BF84-4734-B9AD-ED9F3FB85D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.110:*:*:*:*:*:*:*", "matchCriteriaId": "B6B410FC-650E-4E51-8634-D99113E8B1AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.111:*:*:*:*:*:*:*", "matchCriteriaId": "45C6B358-93A6-4A9A-B284-9DFA9C981620", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.112:*:*:*:*:*:*:*", "matchCriteriaId": "2638B249-E955-48B3-A309-EF92737E015D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.113:*:*:*:*:*:*:*", "matchCriteriaId": "2F275DA6-7799-4B51-8F9C-DD23E8A3C5AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.114:*:*:*:*:*:*:*", "matchCriteriaId": "4FB961BA-8FAB-4FC5-B582-AF758E7D0E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.115:*:*:*:*:*:*:*", "matchCriteriaId": "A400F721-435F-4EBA-8BC2-92E4769A35A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.116:*:*:*:*:*:*:*", "matchCriteriaId": "61206A1A-FF1A-4A45-8952-509168BD8495", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.610:*:*:*:*:*:*:*", "matchCriteriaId": "6618B6DC-77E8-441E-B3A2-AEFFAADCD702", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.701:*:*:*:*:*:*:*", "matchCriteriaId": "2FFC8653-88CB-4AD9-B2C6-6D1F73354222", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.702:*:*:*:*:*:*:*", "matchCriteriaId": "1D6B18C1-6D0D-4E4C-BE98-1337061847CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.703:*:*:*:*:*:*:*", "matchCriteriaId": "5B0481E8-356F-404B-8931-30FA058564CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.704:*:*:*:*:*:*:*", "matchCriteriaId": "91B5C969-EDB7-4839-8CD2-23F88A4F3BEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5015:*:*:*:*:*:*:*", "matchCriteriaId": "6FEA17FF-5E97-4E57-9AE0-132D26600AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5016:*:*:*:*:*:*:*", "matchCriteriaId": "BD596361-5520-4CDC-A96C-B19B8DEA6919", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5017:*:*:*:*:*:*:*", "matchCriteriaId": "0465E63F-584D-47FC-9081-B03FBDA2B6EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5018:*:*:*:*:*:*:*", "matchCriteriaId": "E5879495-DB93-4F1A-B48F-369F198492AB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument." }, { "lang": "es", "value": "El servicio SMTP de MailEnable Standard v1.92 y anteriores, Professional v2.0 y anteriores, y Enterprise v2.0 y versiones anteriores, antes de MESMTPC hotfix,permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de programa) a trav\u00e9s del comando HELO con un byte nulo en el argumento, probablemente lanzando una inconsistencia de longitud o p\u00e9rdida de argumento." } ], "id": "CVE-2006-3277", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-06-28T22:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20790" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016376" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.divisionbyzero.be/?p=173" }, { "source": "cve@mitre.org", "url": "http://www.divisionbyzero.be/?p=174" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/mesmtpc.zip" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/26791" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/438374/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/18630" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/2520" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.divisionbyzero.be/?p=173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.divisionbyzero.be/?p=174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/mesmtpc.zip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/26791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/438374/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/18630" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/2520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27387" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-31 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in SMTP authentication for MailEnable allows remote attackers to cause a denial of service (crash).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/15487 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/15487 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 1.00 | |
mailenable | mailenable_enterprise | 1.01 | |
mailenable | mailenable_enterprise | 1.02 | |
mailenable | mailenable_enterprise | 1.03 | |
mailenable | mailenable_enterprise | 1.04 | |
mailenable | mailenable_professional | 1.5 | |
mailenable | mailenable_professional | 1.51 | |
mailenable | mailenable_professional | 1.52 | |
mailenable | mailenable_professional | 1.53 | |
mailenable | mailenable_professional | 1.54 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*", "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*", "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*", "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*", "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in SMTP authentication for MailEnable allows remote attackers to cause a denial of service (crash)." } ], "id": "CVE-2005-1781", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-31T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15487" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-02-01 22:02
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in MailEnable Enterprise Edition before 1.2 allows remote attackers to cause a denial of service (CPU utilization) by viewing "formatted quoted-printable emails" via webmail.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 1.00 | |
mailenable | mailenable_enterprise | 1.1 | |
mailenable | mailenable_enterprise | 1.01 | |
mailenable | mailenable_enterprise | 1.02 | |
mailenable | mailenable_enterprise | 1.03 | |
mailenable | mailenable_enterprise | 1.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in MailEnable Enterprise Edition before 1.2 allows remote attackers to cause a denial of service (CPU utilization) by viewing \"formatted quoted-printable emails\" via webmail." } ], "id": "CVE-2006-0504", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-02-01T22:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/18716" }, { "source": "cve@mitre.org", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18716" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24517" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | * | |
mailenable | mailenable_professional | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "358AEB41-C0E6-4A62-A31D-5600CF2056BC", "versionEndIncluding": "1.04", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4DB22E1-238F-41A3-98D6-6EF5C31EB972", "versionEndIncluding": "1.54", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header." } ], "id": "CVE-2005-1348", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=111445834220015\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1013786" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/15737" }, { "source": "cve@mitre.org", "tags": [ "URL Repurposed" ], "url": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=111445834220015\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1013786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/15737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "URL Repurposed" ], "url": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-10-10 04:06
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via "the signature field of NTLM Type 1 messages".
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 2.0 | |
mailenable | mailenable_professional | 2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ABEB364-389B-46AF-B04F-88EC3AF9DB8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4FD7082-AC93-426F-9DA7-50CBFFDAC07A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via \"the signature field of NTLM Type 1 messages\"." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en la validaci\u00f3n NTLM enMailEnable Professional 2.0 y Enterprise 2.0 permite a un atacante remoto ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de \"el campo de mensajes de firma de NTLM Tipo 1\"." } ], "evaluatorSolution": "Hotfixes are available on the vendor web site that address this and related vulnerabilities.", "id": "CVE-2006-5176", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-10-10T04:06:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22179" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/20290" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3862" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/20290" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29284" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-12-19 19:28
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | * | |
mailenable | mailenable_enterprise | 1.41 | |
mailenable | mailenable_professional | * | |
mailenable | mailenable_professional | 1.84 | |
mailenable | mailenable_standard | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D4ECC9C-9D19-41F8-8A9A-86CDAAF591AB", "versionEndIncluding": "2.35", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D83D1EA7-A3D6-41AA-B922-18885328D292", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "7173C4E7-ACB7-4277-B4E8-79E655B97EEF", "versionEndIncluding": "2.35", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*", "matchCriteriaId": "201B610A-DD27-48D2-A3EF-DFEBBDEA04BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AAE8D3D-FF57-49B1-AE03-3ADB815A5DE8", "versionEndIncluding": "1.98", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el servicio POP de MailEnable Standard 1.98 y anteriores ; Professional 1.84, y 2.35 y anteriores; y Enterprise 1.41, y 2.35 y anteriores a ME-10026 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un argumento largo al comando PASS." } ], "id": "CVE-2006-6605", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-19T19:28:00.000", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23127" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-75/advisory/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://securityreason.com/securityalert/2053" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://securitytracker.com/id?1017395" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/21645" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.vupen.com/english/advisories/2006/5052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-75/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2053" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/21645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/5052" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-10 23:44
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | * | |
mailenable | mailenable_professional | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6496BBB-BF66-4CA5-B1E1-BF65D58DEB0E", "versionEndIncluding": "3.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "46C4F770-9BCC-42AB-B04C-3ACD60357472", "versionEndIncluding": "3.13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands." }, { "lang": "es", "value": "Vulnerabilidad de desbordamiento de b\u00fafer en el Servicio IMAP (MEIMAPS.EXE) de MailEnable Professional Edition y Enterprise Edition 3.13 y anteriores, permite a atacantes autenticados remotamente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de argumentos largos hacia los comandos (1) FETCH, (2) EXAMINE y (3) UNSUBSCRIBE." } ], "id": "CVE-2008-1276", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-10T23:44:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29277" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3724" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28145" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019565" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0799/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/5249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0799/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5249" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-12-05 11:28
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "BB6FB230-80C5-4B8D-898E-8C298B2207C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A640E156-FF31-48E6-9D98-E2E669C01C0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*", "matchCriteriaId": "04B96ED6-16EB-42A4-BDC6-0EE45EA38B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "455DD7A6-A83E-4200-B41B-505118FE8E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*", "matchCriteriaId": "7A5462F1-B6D9-43F0-982C-2E4534E79E02", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*", "matchCriteriaId": "3248B134-BF1F-4109-A0DC-DF9A01CC8156", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "849A1A19-83BA-4984-947B-C47DAA515908", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*", "matchCriteriaId": "8E3C2B12-AF3A-44D9-9C91-58F4AB1FE188", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*", "matchCriteriaId": "71A25D16-21ED-4EAD-A535-6000E77ECF35", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*", "matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*", "matchCriteriaId": "DC5AC063-9D7B-45A2-9D90-B85E2DFBB6F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*", "matchCriteriaId": "CD73FDB9-4A1E-4A8A-A541-21C7726A152C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*", "matchCriteriaId": "1491392B-467F-4CA0-B6D7-2A7478C4DFA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*", "matchCriteriaId": "4C3F71BC-639F-4966-B05D-5E3BB9C5FA3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "056C7707-A07C-4F4A-8390-97885581802F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*", "matchCriteriaId": "0025F745-D34D-4275-9A3B-5530B7A0A520", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*", "matchCriteriaId": "AFB9ECA3-FFF5-447D-B685-666669410D7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*", "matchCriteriaId": "B56A4283-E0DB-42CE-9551-FC3DBC7E50A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*", "matchCriteriaId": "F80F2B0F-8461-47C3-A07A-98681D255478", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ABEB364-389B-46AF-B04F-88EC3AF9DB8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "35DD2182-B2D2-4BFB-BEE9-A9F0F8666791", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "E89D25B0-6924-4561-A056-972F80740E23", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C72359EA-1289-456C-BEB0-F7C910DE1A2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.03:*:*:*:*:*:*:*", "matchCriteriaId": "BB079D44-2AD7-44B1-A8A8-AF8166CEED45", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.04:*:*:*:*:*:*:*", "matchCriteriaId": "F0F70886-33C4-419B-BF7E-26EAB3DDD1AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.05:*:*:*:*:*:*:*", "matchCriteriaId": "574E97CD-A04F-4BE8-86AA-07B9275D583D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.06:*:*:*:*:*:*:*", "matchCriteriaId": "AB8D602E-C0A9-4134-90E2-18FA49741563", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.07:*:*:*:*:*:*:*", "matchCriteriaId": "E9CA827C-43C6-4EA4-AF50-984E0EE035AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.08:*:*:*:*:*:*:*", "matchCriteriaId": "95859193-BD9A-43D2-AD49-F405F5ACB44F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.09:*:*:*:*:*:*:*", "matchCriteriaId": "C880FF94-935E-4023-82A3-E2CD62E13BAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.11:*:*:*:*:*:*:*", "matchCriteriaId": "395D0374-CEB6-4D59-BAB5-499C6E90BBCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "78486120-1FBD-454B-8CC7-5727889E66B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.13:*:*:*:*:*:*:*", "matchCriteriaId": "52A55CDE-4AF8-4458-8E72-426588A46188", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EF2296B9-4F7E-491A-B209-6D79BC5C9105", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.15:*:*:*:*:*:*:*", "matchCriteriaId": "2074C3AE-08BF-49A0-BE7E-065671BF8742", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.16:*:*:*:*:*:*:*", "matchCriteriaId": "D1FA7867-EACD-43BD-9D5A-CFA5EAB8CAEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.17:*:*:*:*:*:*:*", "matchCriteriaId": "B14B554F-92D2-41DA-B57F-830447161948", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.18:*:*:*:*:*:*:*", "matchCriteriaId": "5E08ADC5-7B68-4440-BA96-0B97E360C3E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.19:*:*:*:*:*:*:*", "matchCriteriaId": "FD43B0A5-5440-46B2-AC91-0565F9E08AE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.21:*:*:*:*:*:*:*", "matchCriteriaId": "BAD474D9-182E-4572-9F8F-652756189721", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.22:*:*:*:*:*:*:*", "matchCriteriaId": "54CC311F-0F3F-4465-84ED-D2BA24632819", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.23:*:*:*:*:*:*:*", "matchCriteriaId": "6DF0DCBB-F15A-4443-82B1-DF71CA06551D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.24:*:*:*:*:*:*:*", "matchCriteriaId": "31732C13-5587-43FC-89CE-30DEC4E8D30B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.25:*:*:*:*:*:*:*", "matchCriteriaId": "29DDED08-3561-48C1-94E6-F27F2DA18FD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.26:*:*:*:*:*:*:*", "matchCriteriaId": "66B3190A-FE7C-430C-9B80-3228803085E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.27:*:*:*:*:*:*:*", "matchCriteriaId": "16948701-ED10-440B-9B59-D8D51C7C031F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.28:*:*:*:*:*:*:*", "matchCriteriaId": "891E7776-DEBD-4282-86C7-22F59F73B216", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.29:*:*:*:*:*:*:*", "matchCriteriaId": "A62419C7-789F-4131-BE98-3B546E946F02", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "BC923FB9-90C6-4433-BF94-CF87FA2255BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "BF0E9D73-4283-44AE-BFB9-159FE84580A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "84ACF997-81AF-45EC-9200-2C63B37D93D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.33:*:*:*:*:*:*:*", "matchCriteriaId": "1DC2DF4F-7D02-4BCE-BD59-5482EFF9262C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.82:*:*:*:*:*:*:*", "matchCriteriaId": "4F785125-F530-4674-B2B3-0D97E8397391", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4FD7082-AC93-426F-9DA7-50CBFFDAC07A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.33:*:*:*:*:*:*:*", "matchCriteriaId": "87E5107B-BDC2-4972-A3A4-AA6782E46B0E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer basados en pila en el m\u00f3dulo IMAP (MEIMAPS.EXE) de MailEnable Professional 1.6 hasta 1.82 y 2.0 hasta 2.33, y MailEnable Enterprise 1.1 hasta 1.30 y 2.0 hasta 2.33 permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (ca\u00edda) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un argumento largo a los comandos (1) EXAMINE o (2) SELECT." } ], "id": "CVE-2006-6290", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-05T11:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/23047" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/23080" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-71/advisory/" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017276" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017319" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/21362" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/4673" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/4778" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/23047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/23080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-71/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/21362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4673" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4778" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-11-26 02:03
Modified
2025-04-03 01:03
Severity ?
Summary
IMAP service (meimaps.exe) of MailEnable Professional 1.7 and Enterprise 1.1 allows remote authenticated attackers to cause a denial of service (application crash) by using RENAME with a non-existent mailbox, a different vulnerability than CVE-2005-3690.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 1.1 | |
mailenable | mailenable_professional | 1.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IMAP service (meimaps.exe) of MailEnable Professional 1.7 and Enterprise 1.1 allows remote authenticated attackers to cause a denial of service (application crash) by using RENAME with a non-existent mailbox, a different vulnerability than CVE-2005-3690." } ], "id": "CVE-2005-3813", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-11-26T02:03:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=full-disclosure\u0026m=113285451031500\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17740" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/205" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015268" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/21109" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/417589/30/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/15556" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2579" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://zur.homelinux.com/Advisories/MailEnableImapDos.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=full-disclosure\u0026m=113285451031500\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/21109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/417589/30/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/15556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://zur.homelinux.com/Advisories/MailEnableImapDos.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-21 11:03
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands. NOTE: it is possible that these are alternate vectors for the issue described in CVE-2005-4402.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 1.1 | |
mailenable | mailenable_professional | 1.71 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*", "matchCriteriaId": "93A9222A-6F22-40BD-8411-69A90E8E46AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands. NOTE: it is possible that these are alternate vectors for the issue described in CVE-2005-4402." } ], "id": "CVE-2005-4456", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-21T11:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/18134" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/15985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/15985" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-10 23:44
Modified
2025-04-09 00:30
Severity ?
Summary
The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | * | |
mailenable | mailenable_professional | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6496BBB-BF66-4CA5-B1E1-BF65D58DEB0E", "versionEndIncluding": "3.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "46C4F770-9BCC-42AB-B04C-3ACD60357472", "versionEndIncluding": "3.13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference." }, { "lang": "es", "value": "El servicio IMAP (MEIMAPS.exe) en MailEnable Professional Edition y Enterprise Edition 3.13 y anteriores, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de los comandos (1) SEARCH y (2) APPEND que no tengan los argumentos requeridos, esto induce a una referencia a puntero nulo." } ], "id": "CVE-2008-1277", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-10T23:44:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29277" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3724" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28145" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019565" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0799/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0799/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-07 00:19
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | * | |
mailenable | mailenable_professional | 2.37 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "794B82C8-E0B2-4B79-BF36-3FB9E09AE5FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.37:*:professional:*:*:*:*:*", "matchCriteriaId": "6DC1B3DE-6F03-47BA-AF5C-CDA53120AF41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el servicio IMAP de MailEnable ediciones Enterprise y Professional 2.37 y anteriores permite a usuarios remotos autenticados ejecutar c\u00f3digo de su elecci\u00f3n mediante una argumento largo al comando APPEND. NOTA: esta vulnerabilidad es, probablemente, diferente que CVE-2006-6423." } ], "id": "CVE-2007-1301", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-03-07T00:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24361" }, { "source": "cve@mitre.org", "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/22792" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1017739" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0811" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/3397" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/22792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1017739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/3397" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-11-19 01:03
Modified
2025-04-03 01:03
Severity ?
Summary
Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail directories via the mailbox name argument of the (1) create or (2) rename commands.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 1.00 | |
mailenable | mailenable_enterprise | 1.1 | |
mailenable | mailenable_enterprise | 1.01 | |
mailenable | mailenable_enterprise | 1.02 | |
mailenable | mailenable_enterprise | 1.03 | |
mailenable | mailenable_enterprise | 1.04 | |
mailenable | mailenable_professional | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08", "vulnerable": false }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": false }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965", "vulnerable": false }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5", "vulnerable": false }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310", "vulnerable": false }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979", "vulnerable": false }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B880760-D0E3-46C6-A12F-3D9A444C92C1", "versionEndIncluding": "1.6", "vulnerable": false } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail directories via the mailbox name argument of the (1) create or (2) rename commands." } ], "id": "CVE-2005-3691", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-11-19T01:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17633" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-59/advisory/" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015239" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/15494" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-59/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/15494" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2484" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-04-15 10:02
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*", "matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*", "matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*", "matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*", "matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*", "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*", "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*", "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*", "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*", "matchCriteriaId": "93A9222A-6F22-40BD-8411-69A90E8E46AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*", "matchCriteriaId": "6F4AADE9-F3FB-4272-8026-58FC677D3F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*", "matchCriteriaId": "9DD53801-B8F7-4AE8-BA2B-AC6297340CB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "34E00689-F421-4B3B-96D7-14DC66DB42B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "51B4AA11-F7A1-4297-B6B7-68A815FCE189", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*", "matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*", "matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.91:*:*:*:*:*:*:*", "matchCriteriaId": "E1517796-B826-40A3-9654-3BA1DA4E4CC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.92:*:*:*:*:*:*:*", "matchCriteriaId": "735523E7-25D9-4541-B389-D1098052F841", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.93:*:*:*:*:*:*:*", "matchCriteriaId": "E67F8892-2A24-4EF4-ABFA-E7651DF4C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*", "matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*", "matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*", "matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*", "matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337." } ], "id": "CVE-2006-1792", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-04-15T10:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "cve@mitre.org", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "cve@mitre.org", "url": "http://www.mailenable.com/standardhistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mailenable.com/standardhistory.asp" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-11-19 01:03
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (4) rename, (5) subscribe, or (6) unsubscribe commands.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | * | |
mailenable | mailenable_professional | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D7F1033-3C99-4E4F-8068-910B23C0673F", "versionEndIncluding": "1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B880760-D0E3-46C6-A12F-3D9A444C92C1", "versionEndIncluding": "1.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (4) rename, (5) subscribe, or (6) unsubscribe commands." } ], "id": "CVE-2005-3690", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-11-19T01:03:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0581.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17633" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-59/advisory/" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015239" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/20929" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/15492" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2484" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0581.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-59/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/20929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/15492" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23110" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the IMAP service for MailEnable Enterprise 1.04 and earlier and Professional 1.54 allows remote attackers to execute arbitrary code via a long AUTHENTICATE command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 1.0 | |
mailenable | mailenable_enterprise | 1.01 | |
mailenable | mailenable_enterprise | 1.02 | |
mailenable | mailenable_enterprise | 1.03 | |
mailenable | mailenable_enterprise | 1.04 | |
mailenable | mailenable_professional | 1.5 | |
mailenable | mailenable_professional | 1.51 | |
mailenable | mailenable_professional | 1.52 | |
mailenable | mailenable_professional | 1.53 | |
mailenable | mailenable_professional | 1.54 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E228B31-0D62-41E3-A475-550BBFAA4336", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*", "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*", "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*", "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*", "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the IMAP service for MailEnable Enterprise 1.04 and earlier and Professional 1.54 allows remote attackers to execute arbitrary code via a long AUTHENTICATE command." } ], "id": "CVE-2005-1014", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033123.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/14812" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1013637" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/12995" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033123.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/14812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1013637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/12995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19947" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-09-07 00:04
Modified
2025-04-03 01:03
Severity ?
Summary
SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | * | |
mailenable | mailenable_professional | * | |
mailenable | mailenable_standard | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "794B82C8-E0B2-4B79-BF36-3FB9E09AE5FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "F99747EE-1CD0-4DD1-93BD-ACA95EC5B2CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*", "matchCriteriaId": "B924438E-5E77-43D5-873C-70F1B2FE4191", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception." }, { "lang": "es", "value": "El servicio SMTP en MailEnable Standard, Professional, y Enterprise anterior a ME-10014 (04/09/2006) permite a un atacante remoto provocar denegaci\u00f3n de servicio a trav\u00e9s de una b\u00fasqueda SPF para un dominio con un gran n\u00famero de registros, lo cual dispara una excepci\u00f3n de puntero nulo." } ], "id": "CVE-2006-4616", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-09-07T00:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21998" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016792" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/20091" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3669" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21998" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/20091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3669" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The SMTP service in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to cause a denial of service (server crash) via an EHLO command with a Unicode string.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 1.00 | |
mailenable | mailenable_enterprise | 1.01 | |
mailenable | mailenable_enterprise | 1.02 | |
mailenable | mailenable_enterprise | 1.03 | |
mailenable | mailenable_enterprise | 1.04 | |
mailenable | mailenable_professional | 1.5 | |
mailenable | mailenable_professional | 1.51 | |
mailenable | mailenable_professional | 1.52 | |
mailenable | mailenable_professional | 1.53 | |
mailenable | mailenable_professional | 1.54 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*", "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*", "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*", "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*", "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SMTP service in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to cause a denial of service (server crash) via an EHLO command with a Unicode string." } ], "id": "CVE-2005-1013", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=111273637518494\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/14812" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1013637" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/15232" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securiteam.com/windowsntfocus/5HP031PFFG.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/12994" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19948" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=111273637518494\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/14812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1013637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/15232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securiteam.com/windowsntfocus/5HP031PFFG.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/12994" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19973" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-12-12 20:28
Modified
2025-04-09 00:30
Severity ?
Summary
The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/23267 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.mailenable.com/hotfix/ | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/21493 | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/30797 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23267 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mailenable.com/hotfix/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/21493 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/30797 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "BB6FB230-80C5-4B8D-898E-8C298B2207C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A640E156-FF31-48E6-9D98-E2E669C01C0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*", "matchCriteriaId": "04B96ED6-16EB-42A4-BDC6-0EE45EA38B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "455DD7A6-A83E-4200-B41B-505118FE8E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*", "matchCriteriaId": "7A5462F1-B6D9-43F0-982C-2E4534E79E02", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*", "matchCriteriaId": "3248B134-BF1F-4109-A0DC-DF9A01CC8156", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "849A1A19-83BA-4984-947B-C47DAA515908", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*", "matchCriteriaId": "8E3C2B12-AF3A-44D9-9C91-58F4AB1FE188", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*", "matchCriteriaId": "71A25D16-21ED-4EAD-A535-6000E77ECF35", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*", "matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*", "matchCriteriaId": "DC5AC063-9D7B-45A2-9D90-B85E2DFBB6F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*", "matchCriteriaId": "CD73FDB9-4A1E-4A8A-A541-21C7726A152C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*", "matchCriteriaId": "1491392B-467F-4CA0-B6D7-2A7478C4DFA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*", "matchCriteriaId": "4C3F71BC-639F-4966-B05D-5E3BB9C5FA3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "056C7707-A07C-4F4A-8390-97885581802F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*", "matchCriteriaId": "0025F745-D34D-4275-9A3B-5530B7A0A520", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*", "matchCriteriaId": "AFB9ECA3-FFF5-447D-B685-666669410D7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*", "matchCriteriaId": "B56A4283-E0DB-42CE-9551-FC3DBC7E50A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*", "matchCriteriaId": "F80F2B0F-8461-47C3-A07A-98681D255478", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.31:*:*:*:*:*:*:*", "matchCriteriaId": "D2E1599A-9928-4A06-B650-1238D62CD2C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.32:*:*:*:*:*:*:*", "matchCriteriaId": "E07825D6-EBA0-42B5-BE18-DA3D440A986D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.33:*:*:*:*:*:*:*", "matchCriteriaId": "3C153370-5AD2-4020-9656-5BDD7644F692", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.34:*:*:*:*:*:*:*", "matchCriteriaId": "50451621-1AF5-4A17-9355-62D78DDAE7A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.35:*:*:*:*:*:*:*", "matchCriteriaId": "EC62336F-5F8F-4FF7-B2FB-CBBBAEC77162", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.36:*:*:*:*:*:*:*", "matchCriteriaId": "75BF5AF2-FAD4-48B4-B893-035F5A82A58D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.37:*:*:*:*:*:*:*", "matchCriteriaId": "C4F5CF79-543F-4ECA-B5A3-5212A1D0A18E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.38:*:*:*:*:*:*:*", "matchCriteriaId": "D80141E2-F98C-458C-BAFB-8272BD2BBE4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.39:*:*:*:*:*:*:*", "matchCriteriaId": "CCA17BD7-A9FC-4FA3-88D4-38D9BD197963", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.40:*:*:*:*:*:*:*", "matchCriteriaId": "393240E7-FE4F-4535-B5F0-6609F4A01646", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ABEB364-389B-46AF-B04F-88EC3AF9DB8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "35DD2182-B2D2-4BFB-BEE9-A9F0F8666791", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C72359EA-1289-456C-BEB0-F7C910DE1A2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "84ACF997-81AF-45EC-9200-2C63B37D93D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.33:*:*:*:*:*:*:*", "matchCriteriaId": "1DC2DF4F-7D02-4BCE-BD59-5482EFF9262C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "E3FEF237-35BB-4298-B458-B933472D028B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*", "matchCriteriaId": "6F4AADE9-F3FB-4272-8026-58FC677D3F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*", "matchCriteriaId": "9DD53801-B8F7-4AE8-BA2B-AC6297340CB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.82:*:*:*:*:*:*:*", "matchCriteriaId": "4F785125-F530-4674-B2B3-0D97E8397391", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.83:*:*:*:*:*:*:*", "matchCriteriaId": "5F59A308-7D1A-4C4F-A34C-27FDCF12E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4FD7082-AC93-426F-9DA7-50CBFFDAC07A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB0576FE-F0BC-4DA7-B007-7DA49F369700", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B2826B3D-44E0-4D4B-A681-8C3DADF522F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "662AEDE4-698E-4C78-93B4-4B915749DF80", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.33:*:*:*:*:*:*:*", "matchCriteriaId": "87E5107B-BDC2-4972-A3A4-AA6782E46B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "6739BEA4-C75F-476E-AF5D-449D8236E042", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information." }, { "lang": "es", "value": "El servicio IMAP para el MailEnable Professional y Enterprise Edition de la 2.0 a la 2.34 inclusive, Professional Edition de la 1.6 a la 1.83 inclusive, and Enterprise Edition de la 1.1 a la 1.40 inclusive, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante vectores sin especificar que disparan una referencia a un puntero nulo, como la tratada en el ME-10023 hotfix y diferente a la CVE-2006-6423. NOTA: algunos detalles se obtienen a partir de la informaci\u00f3n de terceros." } ], "id": "CVE-2006-6484", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-12T20:28:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23267" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/21493" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/21493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-02-12 11:28
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 1.0 | |
mailenable | mailenable_enterprise | 1.00 | |
mailenable | mailenable_enterprise | 1.1 | |
mailenable | mailenable_enterprise | 1.01 | |
mailenable | mailenable_enterprise | 1.02 | |
mailenable | mailenable_enterprise | 1.2 | |
mailenable | mailenable_enterprise | 1.03 | |
mailenable | mailenable_enterprise | 1.04 | |
mailenable | mailenable_standard | 1.71 | |
mailenable | mailenable_standard | 1.72 | |
mailenable | mailenable_standard | 1.701 | |
mailenable | mailenable_standard | 1.702 | |
mailenable | mailenable_standard | 1.703 | |
mailenable | mailenable_standard | 1.704 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E228B31-0D62-41E3-A475-550BBFAA4336", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*", "matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*", "matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*", "matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*", "matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*", "matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*", "matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la caracter\u00edstica cryptographic en MailEnable Standard Edition anetrior a 1.93, Professional Edition anterior a 1.73, y Enterprise Edition anterior a 1.21 lleva a \"validaci\u00f3n de seguridad debil\" con un impacto desconocido y vectores de ataque, NOTA: debido a la escasez de detalles, no es\u00e1 claro si esto es lo mismo que CVE-2006-1792." } ], "id": "CVE-2006-6997", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-02-12T11:28:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mailenable.com/standardhistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mailenable.com/standardhistory.asp" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-20 11:03
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in MailEnable Professional 1.71 and earlier, and Enterprise 1.1 and earlier, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | * | |
mailenable | mailenable_professional | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D7F1033-3C99-4E4F-8068-910B23C0673F", "versionEndIncluding": "1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9625752-74A8-417F-9125-C6BB2EC27E16", "versionEndIncluding": "1.71", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in MailEnable Professional 1.71 and earlier, and Enterprise 1.1 and earlier, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command." } ], "id": "CVE-2005-4402", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-20T11:03:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=full-disclosure\u0026m=113502692010867\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/alerts/2005/Dec/1015378.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=full-disclosure\u0026m=113502692010867\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/alerts/2005/Dec/1015378.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2988" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote attackers to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 1.01 | |
mailenable | mailenable_professional | 1.52 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*", "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote attackers to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection." } ], "id": "CVE-2004-2501", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/13318" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1012327" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.hat-squad.com/en/000102.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/12135" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/12136" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/11755" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18285" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/13318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1012327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.hat-squad.com/en/000102.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/12135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/12136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/11755" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18286" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-05 00:03
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple unspecified vulnerabilities in MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allow attackers to cause a denial of service (crash) via invalid IMAP commands.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 1.00 | |
mailenable | mailenable_enterprise | 1.1 | |
mailenable | mailenable_enterprise | 1.01 | |
mailenable | mailenable_enterprise | 1.02 | |
mailenable | mailenable_enterprise | 1.03 | |
mailenable | mailenable_enterprise | 1.04 | |
mailenable | mailenable_professional | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B880760-D0E3-46C6-A12F-3D9A444C92C1", "versionEndIncluding": "1.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allow attackers to cause a denial of service (crash) via invalid IMAP commands." } ], "id": "CVE-2005-3993", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-05T00:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17820" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/21388" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/21388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2704" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-12-12 02:28
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "BB6FB230-80C5-4B8D-898E-8C298B2207C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A640E156-FF31-48E6-9D98-E2E669C01C0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*", "matchCriteriaId": "04B96ED6-16EB-42A4-BDC6-0EE45EA38B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "455DD7A6-A83E-4200-B41B-505118FE8E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*", "matchCriteriaId": "7A5462F1-B6D9-43F0-982C-2E4534E79E02", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*", "matchCriteriaId": "3248B134-BF1F-4109-A0DC-DF9A01CC8156", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "849A1A19-83BA-4984-947B-C47DAA515908", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*", "matchCriteriaId": "8E3C2B12-AF3A-44D9-9C91-58F4AB1FE188", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*", "matchCriteriaId": "71A25D16-21ED-4EAD-A535-6000E77ECF35", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*", "matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*", "matchCriteriaId": "DC5AC063-9D7B-45A2-9D90-B85E2DFBB6F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*", "matchCriteriaId": "CD73FDB9-4A1E-4A8A-A541-21C7726A152C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*", "matchCriteriaId": "1491392B-467F-4CA0-B6D7-2A7478C4DFA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*", "matchCriteriaId": "4C3F71BC-639F-4966-B05D-5E3BB9C5FA3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "056C7707-A07C-4F4A-8390-97885581802F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*", "matchCriteriaId": "0025F745-D34D-4275-9A3B-5530B7A0A520", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*", "matchCriteriaId": "AFB9ECA3-FFF5-447D-B685-666669410D7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*", "matchCriteriaId": "B56A4283-E0DB-42CE-9551-FC3DBC7E50A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*", "matchCriteriaId": "F80F2B0F-8461-47C3-A07A-98681D255478", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.31:*:*:*:*:*:*:*", "matchCriteriaId": "D2E1599A-9928-4A06-B650-1238D62CD2C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.32:*:*:*:*:*:*:*", "matchCriteriaId": "E07825D6-EBA0-42B5-BE18-DA3D440A986D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.33:*:*:*:*:*:*:*", "matchCriteriaId": "3C153370-5AD2-4020-9656-5BDD7644F692", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.34:*:*:*:*:*:*:*", "matchCriteriaId": "50451621-1AF5-4A17-9355-62D78DDAE7A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.35:*:*:*:*:*:*:*", "matchCriteriaId": "EC62336F-5F8F-4FF7-B2FB-CBBBAEC77162", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.36:*:*:*:*:*:*:*", "matchCriteriaId": "75BF5AF2-FAD4-48B4-B893-035F5A82A58D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.37:*:*:*:*:*:*:*", "matchCriteriaId": "C4F5CF79-543F-4ECA-B5A3-5212A1D0A18E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.38:*:*:*:*:*:*:*", "matchCriteriaId": "D80141E2-F98C-458C-BAFB-8272BD2BBE4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.39:*:*:*:*:*:*:*", "matchCriteriaId": "CCA17BD7-A9FC-4FA3-88D4-38D9BD197963", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.40:*:*:*:*:*:*:*", "matchCriteriaId": "393240E7-FE4F-4535-B5F0-6609F4A01646", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D83D1EA7-A3D6-41AA-B922-18885328D292", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.35:*:*:*:*:*:*:*", "matchCriteriaId": "B0743346-9637-498F-BAAF-B193E41A7927", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*", "matchCriteriaId": "201B610A-DD27-48D2-A3EF-DFEBBDEA04BA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el servicio IMAP para MailEnable Professional y Enterprise Edition 2.0 hasta 2.35, Professional Edition 1.6 hasta 1.84, y Enterprise Edition 1.1 hasta 1.41 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un comando de pre-autenticaci\u00f3n seguido de un par\u00e1metro manipulado y una cadena larga como se indica en la actualizaci\u00f3n r\u00e1pida (hotfix) ME-10025" } ], "id": "CVE-2006-6423", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-12T02:28:00.000", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/23201" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-73/advisory/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://securityreason.com/securityalert/2022" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/21492" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/23201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-73/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/21492" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-10 23:44
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | * | |
mailenable | mailenable_professional | * | |
mailenable | mailenable_standard | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DDBCAC5-9215-487B-BFC1-A55982352714", "versionEndIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "77ED3854-23DD-4153-8A40-F26F975CAE72", "versionEndIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*", "matchCriteriaId": "B924438E-5E77-43D5-873C-70F1B2FE4191", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en el servicio SMTP de MailEnable Standard Edition 1.x, Professional Edition 3.x y anteriores, y Enterprise Edition 3.x y anteriores, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante los comandos manipulados (1) EXPN o (2) VRFY." } ], "id": "CVE-2008-1275", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-10T23:44:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29300" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28154" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0800/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/5235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0800/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5235" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-21 11:03
Modified
2025-04-03 01:03
Severity ?
Summary
MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several "..." (triple dot) sequences in a UID FETCH command.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/18134 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18134 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several \"...\" (triple dot) sequences in a UID FETCH command." } ], "id": "CVE-2005-4457", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-21T11:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/18134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18134" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
MailEnable Professional Edition before 1.53 and Enterprise Edition before 1.02 allows remote attackers to cause a denial of service (crash) via malformed (1) SMTP or (2) IMAP commands.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | * | |
mailenable | mailenable_enterprise | 1.0 | |
mailenable | mailenable_enterprise | 1.00 | |
mailenable | mailenable_enterprise | 1.01 | |
mailenable | mailenable_professional | 1.2 | |
mailenable | mailenable_professional | 1.2a | |
mailenable | mailenable_professional | 1.5 | |
mailenable | mailenable_professional | 1.17 | |
mailenable | mailenable_professional | 1.18 | |
mailenable | mailenable_professional | 1.19 | |
mailenable | mailenable_professional | 1.51 | |
mailenable | mailenable_professional | 1.52 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "51327559-08C8-4957-925C-B1DCE15C9423", "versionEndIncluding": "1.26", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E228B31-0D62-41E3-A475-550BBFAA4336", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*", "matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*", "matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*", "matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*", "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*", "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MailEnable Professional Edition before 1.53 and Enterprise Edition before 1.02 allows remote attackers to cause a denial of service (crash) via malformed (1) SMTP or (2) IMAP commands." } ], "id": "CVE-2004-2194", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/11418" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/11418" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-03-21 02:06
Modified
2025-04-03 01:03
Severity ?
Summary
Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving "incorrectly encoded quoted-printable emails".
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*", "matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*", "matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*", "matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*", "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*", "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*", "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*", "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*", "matchCriteriaId": "93A9222A-6F22-40BD-8411-69A90E8E46AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*", "matchCriteriaId": "6F4AADE9-F3FB-4272-8026-58FC677D3F3F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving \"incorrectly encoded quoted-printable emails\"." } ], "id": "CVE-2006-1338", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-03-21T02:06:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19288" }, { "source": "cve@mitre.org", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "cve@mitre.org", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/24014" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/17161" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/1006" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/24014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/1006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25315" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-10-10 04:06
Modified
2025-04-09 00:30
Severity ?
Summary
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 2.0 | |
mailenable | mailenable_professional | 2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ABEB364-389B-46AF-B04F-88EC3AF9DB8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4FD7082-AC93-426F-9DA7-50CBFFDAC07A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read." }, { "lang": "es", "value": "La validaci\u00f3n NTLM en MailEnable Professional 2.0 y Enterprise 2.0 permite a un atacante remoto (1)ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados que afectan a codificaci\u00f3n artesanal base64 mensajes NTLM Tipo 3, o (2) provoca denegaci\u00f3n de servicio a trav\u00e9s de la codificaci\u00f3n base64 de mensajes NTLM Tipo 1, lo cual dispara una sobre lectura de b\u00fafer." } ], "id": "CVE-2006-5177", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-10-10T04:06:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22179" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/20290" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3862" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/20290" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-10-05 23:02
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote attackers to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 1.1 | |
mailenable | mailenable_professional | 1.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote attackers to execute arbitrary code." } ], "id": "CVE-2005-3155", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-10-05T23:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17010" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014999" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/15006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/15006" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2006-0504 (GCVE-0-2006-0504)
Vulnerability from cvelistv5
Published
2006-02-01 22:00
Modified
2024-08-07 16:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in MailEnable Enterprise Edition before 1.2 allows remote attackers to cause a denial of service (CPU utilization) by viewing "formatted quoted-printable emails" via webmail.
References
▼ | URL | Tags |
---|---|---|
http://www.mailenable.com/enterprisehistory.asp | x_refsource_CONFIRM | |
http://secunia.com/advisories/18716 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24517 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:41:27.525Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "18716", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18716" }, { "name": "mailenable-webmail-dos(24517)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24517" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in MailEnable Enterprise Edition before 1.2 allows remote attackers to cause a denial of service (CPU utilization) by viewing \"formatted quoted-printable emails\" via webmail." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "18716", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18716" }, { "name": "mailenable-webmail-dos(24517)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24517" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0504", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in MailEnable Enterprise Edition before 1.2 allows remote attackers to cause a denial of service (CPU utilization) by viewing \"formatted quoted-printable emails\" via webmail." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mailenable.com/enterprisehistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "18716", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18716" }, { "name": "mailenable-webmail-dos(24517)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24517" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0504", "datePublished": "2006-02-01T22:00:00", "dateReserved": "2006-02-01T00:00:00", "dateUpdated": "2024-08-07T16:41:27.525Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-2501 (GCVE-0-2004-2501)
Vulnerability from cvelistv5
Published
2005-10-25 04:00
Modified
2024-08-08 01:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote attackers to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection.
References
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/12136 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/13318 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1012327 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18286 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/11755 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/12135 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18285 | vdb-entry, x_refsource_XF | |
http://www.hat-squad.com/en/000102.html | x_refsource_MISC | |
http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:29:13.868Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "12136", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/12136" }, { "name": "13318", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13318" }, { "name": "1012327", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1012327" }, { "name": "mailenable-imap-code-execution(18286)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18286" }, { "name": "11755", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11755" }, { "name": "12135", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/12135" }, { "name": "mailenable-imap-bo(18285)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18285" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.hat-squad.com/en/000102.html" }, { "name": "20041125 Remote buffer overflow in MailEnable IMAP service [Hat-Squad Advisory]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-11-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote attackers to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "12136", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/12136" }, { "name": "13318", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13318" }, { "name": "1012327", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1012327" }, { "name": "mailenable-imap-code-execution(18286)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18286" }, { "name": "11755", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11755" }, { "name": "12135", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/12135" }, { "name": "mailenable-imap-bo(18285)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18285" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.hat-squad.com/en/000102.html" }, { "name": "20041125 Remote buffer overflow in MailEnable IMAP service [Hat-Squad Advisory]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2501", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote attackers to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "12136", "refsource": "OSVDB", "url": "http://www.osvdb.org/12136" }, { "name": "13318", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13318" }, { "name": "1012327", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1012327" }, { "name": "mailenable-imap-code-execution(18286)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18286" }, { "name": "11755", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11755" }, { "name": "12135", "refsource": "OSVDB", "url": "http://www.osvdb.org/12135" }, { "name": "mailenable-imap-bo(18285)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18285" }, { "name": "http://www.hat-squad.com/en/000102.html", "refsource": "MISC", "url": "http://www.hat-squad.com/en/000102.html" }, { "name": "20041125 Remote buffer overflow in MailEnable IMAP service [Hat-Squad Advisory]", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2501", "datePublished": "2005-10-25T04:00:00", "dateReserved": "2005-10-25T00:00:00", "dateUpdated": "2024-08-08T01:29:13.868Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-1792 (GCVE-0-2006-1792)
Vulnerability from cvelistv5
Published
2006-04-15 10:00
Modified
2024-09-17 00:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337.
References
▼ | URL | Tags |
---|---|---|
http://www.mailenable.com/professionalhistory.asp | x_refsource_CONFIRM | |
http://www.mailenable.com/enterprisehistory.asp | x_refsource_CONFIRM | |
http://www.mailenable.com/standardhistory.asp | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:27:28.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/standardhistory.asp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-04-15T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/standardhistory.asp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1792", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mailenable.com/professionalhistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "name": "http://www.mailenable.com/enterprisehistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "http://www.mailenable.com/standardhistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/standardhistory.asp" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1792", "datePublished": "2006-04-15T10:00:00Z", "dateReserved": "2006-04-15T00:00:00Z", "dateUpdated": "2024-09-17T00:56:41.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-5176 (GCVE-0-2006-5176)
Vulnerability from cvelistv5
Published
2006-10-06 00:00
Modified
2024-08-07 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via "the signature field of NTLM Type 1 messages".
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/22179 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29284 | vdb-entry, x_refsource_XF | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/20290 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2006/3862 | vdb-entry, x_refsource_VUPEN | |
http://labs.musecurity.com/advisories/MU-200609-01.txt | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:41:05.040Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "22179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22179" }, { "name": "mailenable-ntlm-message-bo(29284)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29284" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "20290", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20290" }, { "name": "ADV-2006-3862", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3862" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-09-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via \"the signature field of NTLM Type 1 messages\"." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "22179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22179" }, { "name": "mailenable-ntlm-message-bo(29284)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29284" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "20290", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20290" }, { "name": "ADV-2006-3862", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3862" }, { "tags": [ "x_refsource_MISC" ], "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5176", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via \"the signature field of NTLM Type 1 messages\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "22179", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22179" }, { "name": "mailenable-ntlm-message-bo(29284)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29284" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "20290", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20290" }, { "name": "ADV-2006-3862", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3862" }, { "name": "http://labs.musecurity.com/advisories/MU-200609-01.txt", "refsource": "MISC", "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5176", "datePublished": "2006-10-06T00:00:00", "dateReserved": "2006-10-05T00:00:00", "dateUpdated": "2024-08-07T19:41:05.040Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-6605 (GCVE-0-2006-6605)
Vulnerability from cvelistv5
Published
2006-12-19 19:00
Modified
2024-08-07 20:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1017395 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/23127 | third-party-advisory, x_refsource_SECUNIA | |
http://securityreason.com/securityalert/2053 | third-party-advisory, x_refsource_SREASON | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/21645 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/454713/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/secunia_research/2006-75/advisory/ | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2006/5052 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:33:59.771Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1017395", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017395" }, { "name": "23127", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23127" }, { "name": "2053", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2053" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "21645", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21645" }, { "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-75/advisory/" }, { "name": "ADV-2006-5052", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/5052" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-12-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "1017395", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017395" }, { "name": "23127", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23127" }, { "name": "2053", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2053" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "21645", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21645" }, { "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-75/advisory/" }, { "name": "ADV-2006-5052", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/5052" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2006-6605", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1017395", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017395" }, { "name": "23127", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23127" }, { "name": "2053", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2053" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "21645", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21645" }, { "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded" }, { "name": "http://secunia.com/secunia_research/2006-75/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-75/advisory/" }, { "name": "ADV-2006-5052", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/5052" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2006-6605", "datePublished": "2006-12-19T19:00:00", "dateReserved": "2006-12-17T00:00:00", "dateUpdated": "2024-08-07T20:33:59.771Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3277 (GCVE-0-2006-3277)
Vulnerability from cvelistv5
Published
2006-06-28 22:00
Modified
2024-08-07 18:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument.
References
▼ | URL | Tags |
---|---|---|
http://www.mailenable.com/hotfix/mesmtpc.zip | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27387 | vdb-entry, x_refsource_XF | |
http://securitytracker.com/id?1016376 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2006/2520 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/20790 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/26791 | vdb-entry, x_refsource_OSVDB | |
http://www.divisionbyzero.be/?p=174 | x_refsource_MISC | |
http://www.securityfocus.com/bid/18630 | vdb-entry, x_refsource_BID | |
http://www.divisionbyzero.be/?p=173 | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/438374/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:23:20.680Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/mesmtpc.zip" }, { "name": "mailenable-smtp-helo-dos(27387)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27387" }, { "name": "1016376", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016376" }, { "name": "ADV-2006-2520", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2520" }, { "name": "20790", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20790" }, { "name": "26791", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/26791" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.divisionbyzero.be/?p=174" }, { "name": "18630", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18630" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.divisionbyzero.be/?p=173" }, { "name": "20060624 Mailenable SMTP Service DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/438374/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-06-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/mesmtpc.zip" }, { "name": "mailenable-smtp-helo-dos(27387)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27387" }, { "name": "1016376", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016376" }, { "name": "ADV-2006-2520", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2520" }, { "name": "20790", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20790" }, { "name": "26791", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/26791" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.divisionbyzero.be/?p=174" }, { "name": "18630", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18630" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.divisionbyzero.be/?p=173" }, { "name": "20060624 Mailenable SMTP Service DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/438374/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3277", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mailenable.com/hotfix/mesmtpc.zip", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/mesmtpc.zip" }, { "name": "mailenable-smtp-helo-dos(27387)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27387" }, { "name": "1016376", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016376" }, { "name": "ADV-2006-2520", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2520" }, { "name": "20790", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20790" }, { "name": "26791", "refsource": "OSVDB", "url": "http://www.osvdb.org/26791" }, { "name": "http://www.divisionbyzero.be/?p=174", "refsource": "MISC", "url": "http://www.divisionbyzero.be/?p=174" }, { "name": "18630", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18630" }, { "name": "http://www.divisionbyzero.be/?p=173", "refsource": "MISC", "url": "http://www.divisionbyzero.be/?p=173" }, { "name": "20060624 Mailenable SMTP Service DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/438374/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3277", "datePublished": "2006-06-28T22:00:00", "dateReserved": "2006-06-28T00:00:00", "dateUpdated": "2024-08-07T18:23:20.680Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-4402 (GCVE-0-2005-4402)
Vulnerability from cvelistv5
Published
2005-12-20 11:00
Modified
2024-08-07 23:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in MailEnable Professional 1.71 and earlier, and Enterprise 1.1 and earlier, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/alerts/2005/Dec/1015378.html | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2005/2988 | vdb-entry, x_refsource_VUPEN | |
http://marc.info/?l=full-disclosure&m=113502692010867&w=2 | mailing-list, x_refsource_FULLDISC | |
http://www.mailenable.com/hotfix/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:46:04.337Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1015378", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/alerts/2005/Dec/1015378.html" }, { "name": "ADV-2005-2988", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2988" }, { "name": "20051219 Remote Buffer Overflow in Mailenable Enterprise", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://marc.info/?l=full-disclosure\u0026m=113502692010867\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in MailEnable Professional 1.71 and earlier, and Enterprise 1.1 and earlier, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1015378", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/alerts/2005/Dec/1015378.html" }, { "name": "ADV-2005-2988", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2988" }, { "name": "20051219 Remote Buffer Overflow in Mailenable Enterprise", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://marc.info/?l=full-disclosure\u0026m=113502692010867\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.mailenable.com/hotfix/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4402", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in MailEnable Professional 1.71 and earlier, and Enterprise 1.1 and earlier, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1015378", "refsource": "SECTRACK", "url": "http://securitytracker.com/alerts/2005/Dec/1015378.html" }, { "name": "ADV-2005-2988", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2988" }, { "name": "20051219 Remote Buffer Overflow in Mailenable Enterprise", "refsource": "FULLDISC", "url": "http://marc.info/?l=full-disclosure\u0026m=113502692010867\u0026w=2" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "MISC", "url": "http://www.mailenable.com/hotfix/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4402", "datePublished": "2005-12-20T11:00:00", "dateReserved": "2005-12-20T00:00:00", "dateUpdated": "2024-08-07T23:46:04.337Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3813 (GCVE-0-2005-3813)
Vulnerability from cvelistv5
Published
2005-11-26 02:00
Modified
2024-08-07 23:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IMAP service (meimaps.exe) of MailEnable Professional 1.7 and Enterprise 1.1 allows remote authenticated attackers to cause a denial of service (application crash) by using RENAME with a non-existent mailbox, a different vulnerability than CVE-2005-3690.
References
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/205 | third-party-advisory, x_refsource_SREASON | |
http://marc.info/?l=full-disclosure&m=113285451031500&w=2 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/417589/30/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/15556 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1015268 | vdb-entry, x_refsource_SECTRACK | |
http://zur.homelinux.com/Advisories/MailEnableImapDos.txt | x_refsource_MISC | |
http://secunia.com/advisories/17740 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/21109 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2005/2579 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:24:36.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "205", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/205" }, { "name": "20051124 MailEnable IMAP DOS", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://marc.info/?l=full-disclosure\u0026m=113285451031500\u0026w=2" }, { "name": "20051124 MailEnable IMAP DOS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/417589/30/0/threaded" }, { "name": "15556", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15556" }, { "name": "1015268", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015268" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zur.homelinux.com/Advisories/MailEnableImapDos.txt" }, { "name": "17740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17740" }, { "name": "21109", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/21109" }, { "name": "ADV-2005-2579", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2579" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-24T00:00:00", "descriptions": [ { "lang": "en", "value": "IMAP service (meimaps.exe) of MailEnable Professional 1.7 and Enterprise 1.1 allows remote authenticated attackers to cause a denial of service (application crash) by using RENAME with a non-existent mailbox, a different vulnerability than CVE-2005-3690." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "205", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/205" }, { "name": "20051124 MailEnable IMAP DOS", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://marc.info/?l=full-disclosure\u0026m=113285451031500\u0026w=2" }, { "name": "20051124 MailEnable IMAP DOS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/417589/30/0/threaded" }, { "name": "15556", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15556" }, { "name": "1015268", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015268" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zur.homelinux.com/Advisories/MailEnableImapDos.txt" }, { "name": "17740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17740" }, { "name": "21109", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/21109" }, { "name": "ADV-2005-2579", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2579" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3813", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IMAP service (meimaps.exe) of MailEnable Professional 1.7 and Enterprise 1.1 allows remote authenticated attackers to cause a denial of service (application crash) by using RENAME with a non-existent mailbox, a different vulnerability than CVE-2005-3690." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "205", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/205" }, { "name": "20051124 MailEnable IMAP DOS", "refsource": "FULLDISC", "url": "http://marc.info/?l=full-disclosure\u0026m=113285451031500\u0026w=2" }, { "name": "20051124 MailEnable IMAP DOS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/417589/30/0/threaded" }, { "name": "15556", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15556" }, { "name": "1015268", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015268" }, { "name": "http://zur.homelinux.com/Advisories/MailEnableImapDos.txt", "refsource": "MISC", "url": "http://zur.homelinux.com/Advisories/MailEnableImapDos.txt" }, { "name": "17740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17740" }, { "name": "21109", "refsource": "OSVDB", "url": "http://www.osvdb.org/21109" }, { "name": "ADV-2005-2579", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2579" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3813", "datePublished": "2005-11-26T02:00:00", "dateReserved": "2005-11-26T00:00:00", "dateUpdated": "2024-08-07T23:24:36.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-5177 (GCVE-0-2006-5177)
Vulnerability from cvelistv5
Published
2006-10-06 00:00
Modified
2024-08-07 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/29287 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/22179 | third-party-advisory, x_refsource_SECUNIA | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29286 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/20290 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2006/3862 | vdb-entry, x_refsource_VUPEN | |
http://labs.musecurity.com/advisories/MU-200609-01.txt | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:41:05.016Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mailenable-base64-message-code-execution(29287)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287" }, { "name": "22179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22179" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "mailenable-base64-ntml-message-dos(29286)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286" }, { "name": "20290", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20290" }, { "name": "ADV-2006-3862", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3862" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-09-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mailenable-base64-message-code-execution(29287)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287" }, { "name": "22179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22179" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "mailenable-base64-ntml-message-dos(29286)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286" }, { "name": "20290", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20290" }, { "name": "ADV-2006-3862", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3862" }, { "tags": [ "x_refsource_MISC" ], "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5177", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mailenable-base64-message-code-execution(29287)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287" }, { "name": "22179", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22179" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "mailenable-base64-ntml-message-dos(29286)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286" }, { "name": "20290", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20290" }, { "name": "ADV-2006-3862", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3862" }, { "name": "http://labs.musecurity.com/advisories/MU-200609-01.txt", "refsource": "MISC", "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5177", "datePublished": "2006-10-06T00:00:00", "dateReserved": "2006-10-05T00:00:00", "dateUpdated": "2024-08-07T19:41:05.016Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-6484 (GCVE-0-2006-6484)
Vulnerability from cvelistv5
Published
2006-12-12 20:00
Modified
2024-08-07 20:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/21493 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30797 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/23267 | third-party-advisory, x_refsource_SECUNIA | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:26:46.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "21493", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21493" }, { "name": "mailenable-null-imap-dos(30797)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797" }, { "name": "23267", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23267" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "21493", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21493" }, { "name": "mailenable-null-imap-dos(30797)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797" }, { "name": "23267", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23267" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-6484", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "21493", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21493" }, { "name": "mailenable-null-imap-dos(30797)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797" }, { "name": "23267", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23267" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-6484", "datePublished": "2006-12-12T20:00:00", "dateReserved": "2006-12-12T00:00:00", "dateUpdated": "2024-08-07T20:26:46.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-6290 (GCVE-0-2006-6290)
Vulnerability from cvelistv5
Published
2006-12-05 11:00
Modified
2024-08-07 20:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1017276 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2006/4778 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/23080 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/21362 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1017319 | vdb-entry, x_refsource_SECTRACK | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2006/4673 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/453118/100/100/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/23047 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30614 | vdb-entry, x_refsource_XF | |
http://secunia.com/secunia_research/2006-71/advisory/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:19:35.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1017276", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017276" }, { "name": "ADV-2006-4778", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4778" }, { "name": "23080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23080" }, { "name": "21362", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21362" }, { "name": "1017319", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017319" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "ADV-2006-4673", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4673" }, { "name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded" }, { "name": "23047", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23047" }, { "name": "mailenable-meimaps-bo(30614)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-71/advisory/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1017276", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017276" }, { "name": "ADV-2006-4778", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4778" }, { "name": "23080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23080" }, { "name": "21362", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21362" }, { "name": "1017319", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017319" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "ADV-2006-4673", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4673" }, { "name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded" }, { "name": "23047", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23047" }, { "name": "mailenable-meimaps-bo(30614)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-71/advisory/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-6290", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1017276", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017276" }, { "name": "ADV-2006-4778", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4778" }, { "name": "23080", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23080" }, { "name": "21362", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21362" }, { "name": "1017319", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017319" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "ADV-2006-4673", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4673" }, { "name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded" }, { "name": "23047", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23047" }, { "name": "mailenable-meimaps-bo(30614)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614" }, { "name": "http://secunia.com/secunia_research/2006-71/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-71/advisory/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-6290", "datePublished": "2006-12-05T11:00:00", "dateReserved": "2006-12-05T00:00:00", "dateUpdated": "2024-08-07T20:19:35.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-1338 (GCVE-0-2006-1338)
Vulnerability from cvelistv5
Published
2006-03-21 02:00
Modified
2024-08-07 17:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving "incorrectly encoded quoted-printable emails".
References
▼ | URL | Tags |
---|---|---|
http://www.mailenable.com/professionalhistory.asp | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25315 | vdb-entry, x_refsource_XF | |
http://www.mailenable.com/enterprisehistory.asp | x_refsource_CONFIRM | |
http://secunia.com/advisories/19288 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/24014 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2006/1006 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/17161 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:12:20.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "name": "mailenable-webmail-component-dos(25315)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25315" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "19288", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19288" }, { "name": "24014", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/24014" }, { "name": "ADV-2006-1006", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1006" }, { "name": "17161", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17161" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-03-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving \"incorrectly encoded quoted-printable emails\"." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "name": "mailenable-webmail-component-dos(25315)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25315" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "19288", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19288" }, { "name": "24014", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/24014" }, { "name": "ADV-2006-1006", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1006" }, { "name": "17161", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17161" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1338", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving \"incorrectly encoded quoted-printable emails\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mailenable.com/professionalhistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "name": "mailenable-webmail-component-dos(25315)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25315" }, { "name": "http://www.mailenable.com/enterprisehistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "19288", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19288" }, { "name": "24014", "refsource": "OSVDB", "url": "http://www.osvdb.org/24014" }, { "name": "ADV-2006-1006", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1006" }, { "name": "17161", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17161" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1338", "datePublished": "2006-03-21T02:00:00", "dateReserved": "2006-03-20T00:00:00", "dateUpdated": "2024-08-07T17:12:20.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3691 (GCVE-0-2005-3691)
Vulnerability from cvelistv5
Published
2005-11-19 01:00
Modified
2024-08-07 23:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail directories via the mailbox name argument of the (1) create or (2) rename commands.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/17633 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2005/2484 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/15494 | vdb-entry, x_refsource_BID | |
http://secunia.com/secunia_research/2005-59/advisory/ | x_refsource_MISC | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://securitytracker.com/id?1015239 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:17:23.630Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "17633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17633" }, { "name": "ADV-2005-2484", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2484" }, { "name": "15494", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15494" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-59/advisory/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "1015239", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015239" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail directories via the mailbox name argument of the (1) create or (2) rename commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-24T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "17633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17633" }, { "name": "ADV-2005-2484", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2484" }, { "name": "15494", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15494" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-59/advisory/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "1015239", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015239" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3691", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail directories via the mailbox name argument of the (1) create or (2) rename commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "17633", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17633" }, { "name": "ADV-2005-2484", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2484" }, { "name": "15494", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15494" }, { "name": "http://secunia.com/secunia_research/2005-59/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-59/advisory/" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "1015239", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015239" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3691", "datePublished": "2005-11-19T01:00:00", "dateReserved": "2005-11-19T00:00:00", "dateUpdated": "2024-08-07T23:17:23.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3993 (GCVE-0-2005-3993)
Vulnerability from cvelistv5
Published
2005-12-05 00:00
Modified
2024-08-07 23:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple unspecified vulnerabilities in MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allow attackers to cause a denial of service (crash) via invalid IMAP commands.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/17820 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/21388 | vdb-entry, x_refsource_OSVDB | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2005/2704 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:31:48.929Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "17820", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17820" }, { "name": "21388", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/21388" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "ADV-2005-2704", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2704" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allow attackers to cause a denial of service (crash) via invalid IMAP commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "17820", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17820" }, { "name": "21388", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/21388" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "ADV-2005-2704", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2704" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allow attackers to cause a denial of service (crash) via invalid IMAP commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "17820", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17820" }, { "name": "21388", "refsource": "OSVDB", "url": "http://www.osvdb.org/21388" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "ADV-2005-2704", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2704" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3993", "datePublished": "2005-12-05T00:00:00", "dateReserved": "2005-12-04T00:00:00", "dateUpdated": "2024-08-07T23:31:48.929Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-1014 (GCVE-0-2005-1014)
Vulnerability from cvelistv5
Published
2005-04-08 04:00
Modified
2024-08-07 21:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the IMAP service for MailEnable Enterprise 1.04 and earlier and Professional 1.54 allows remote attackers to execute arbitrary code via a long AUTHENTICATE command.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1013637 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19947 | vdb-entry, x_refsource_XF | |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033123.html | mailing-list, x_refsource_FULLDISC | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/12995 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/14812 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:35:59.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1013637", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013637" }, { "name": "mailenable-imap-dos(19947)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19947" }, { "name": "20050405 MailEnable Imapd remote BoF + Exploit [x0n3-h4ck]", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033123.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "12995", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12995" }, { "name": "14812", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14812" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the IMAP service for MailEnable Enterprise 1.04 and earlier and Professional 1.54 allows remote attackers to execute arbitrary code via a long AUTHENTICATE command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1013637", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013637" }, { "name": "mailenable-imap-dos(19947)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19947" }, { "name": "20050405 MailEnable Imapd remote BoF + Exploit [x0n3-h4ck]", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033123.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "12995", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12995" }, { "name": "14812", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14812" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1014", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the IMAP service for MailEnable Enterprise 1.04 and earlier and Professional 1.54 allows remote attackers to execute arbitrary code via a long AUTHENTICATE command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1013637", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013637" }, { "name": "mailenable-imap-dos(19947)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19947" }, { "name": "20050405 MailEnable Imapd remote BoF + Exploit [x0n3-h4ck]", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033123.html" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "12995", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12995" }, { "name": "14812", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14812" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1014", "datePublished": "2005-04-08T04:00:00", "dateReserved": "2005-04-08T00:00:00", "dateUpdated": "2024-08-07T21:35:59.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-1013 (GCVE-0-2005-1013)
Vulnerability from cvelistv5
Published
2005-04-08 04:00
Modified
2024-08-07 21:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The SMTP service in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to cause a denial of service (server crash) via an EHLO command with a Unicode string.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/12994 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19948 | vdb-entry, x_refsource_XF | |
http://securitytracker.com/id?1013637 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19973 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/15232 | vdb-entry, x_refsource_OSVDB | |
http://marc.info/?l=bugtraq&m=111273637518494&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://www.securiteam.com/windowsntfocus/5HP031PFFG.html | x_refsource_MISC | |
http://secunia.com/advisories/14812 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:35:59.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "12994", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12994" }, { "name": "mailenable-smtp-dos(19948)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19948" }, { "name": "1013637", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013637" }, { "name": "mailenable-ehlo-dos(19973)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19973" }, { "name": "15232", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/15232" }, { "name": "20050405 MailEnable Smtpd remote Dos [x0n3-h4ck]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111273637518494\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securiteam.com/windowsntfocus/5HP031PFFG.html" }, { "name": "14812", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14812" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The SMTP service in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to cause a denial of service (server crash) via an EHLO command with a Unicode string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "12994", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12994" }, { "name": "mailenable-smtp-dos(19948)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19948" }, { "name": "1013637", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013637" }, { "name": "mailenable-ehlo-dos(19973)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19973" }, { "name": "15232", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/15232" }, { "name": "20050405 MailEnable Smtpd remote Dos [x0n3-h4ck]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111273637518494\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securiteam.com/windowsntfocus/5HP031PFFG.html" }, { "name": "14812", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14812" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1013", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SMTP service in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to cause a denial of service (server crash) via an EHLO command with a Unicode string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "12994", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12994" }, { "name": "mailenable-smtp-dos(19948)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19948" }, { "name": "1013637", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013637" }, { "name": "mailenable-ehlo-dos(19973)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19973" }, { "name": "15232", "refsource": "OSVDB", "url": "http://www.osvdb.org/15232" }, { "name": "20050405 MailEnable Smtpd remote Dos [x0n3-h4ck]", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111273637518494\u0026w=2" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "http://www.securiteam.com/windowsntfocus/5HP031PFFG.html", "refsource": "MISC", "url": "http://www.securiteam.com/windowsntfocus/5HP031PFFG.html" }, { "name": "14812", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14812" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1013", "datePublished": "2005-04-08T04:00:00", "dateReserved": "2005-04-08T00:00:00", "dateUpdated": "2024-08-07T21:35:59.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-1348 (GCVE-0-2005-1348)
Vulnerability from cvelistv5
Published
2005-04-28 04:00
Modified
2024-08-07 21:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header.
References
▼ | URL | Tags |
---|---|---|
http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl | x_refsource_MISC | |
http://www.osvdb.org/15737 | vdb-entry, x_refsource_OSVDB | |
http://securitytracker.com/id?1013786 | vdb-entry, x_refsource_SECTRACK | |
http://marc.info/?l=bugtraq&m=111445834220015&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:44:06.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl" }, { "name": "15737", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/15737" }, { "name": "1013786", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013786" }, { "name": "20050424 MailEnable HTTPS Buffer Overflow [x0n3-h4ck]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111445834220015\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-04-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl" }, { "name": "15737", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/15737" }, { "name": "1013786", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013786" }, { "name": "20050424 MailEnable HTTPS Buffer Overflow [x0n3-h4ck]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111445834220015\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl", "refsource": "MISC", "url": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl" }, { "name": "15737", "refsource": "OSVDB", "url": "http://www.osvdb.org/15737" }, { "name": "1013786", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013786" }, { "name": "20050424 MailEnable HTTPS Buffer Overflow [x0n3-h4ck]", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111445834220015\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1348", "datePublished": "2005-04-28T04:00:00", "dateReserved": "2005-04-28T00:00:00", "dateUpdated": "2024-08-07T21:44:06.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-6423 (GCVE-0-2006-6423)
Vulnerability from cvelistv5
Published
2006-12-12 02:00
Modified
2024-08-07 20:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/secunia_research/2006-73/advisory/ | x_refsource_MISC | |
http://securityreason.com/securityalert/2022 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/bid/21492 | vdb-entry, x_refsource_BID | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30796 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/23201 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/454075/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:26:46.508Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-73/advisory/" }, { "name": "2022", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2022" }, { "name": "21492", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21492" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "mailenable-bounds-imap-bo(30796)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796" }, { "name": "23201", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23201" }, { "name": "20061211 Secunia Research: MailEnable IMAP Service Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-73/advisory/" }, { "name": "2022", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2022" }, { "name": "21492", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21492" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "mailenable-bounds-imap-bo(30796)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796" }, { "name": "23201", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23201" }, { "name": "20061211 Secunia Research: MailEnable IMAP Service Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2006-6423", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/secunia_research/2006-73/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-73/advisory/" }, { "name": "2022", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2022" }, { "name": "21492", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21492" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "mailenable-bounds-imap-bo(30796)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796" }, { "name": "23201", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23201" }, { "name": "20061211 Secunia Research: MailEnable IMAP Service Buffer OverflowVulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2006-6423", "datePublished": "2006-12-12T02:00:00", "dateReserved": "2006-12-09T00:00:00", "dateUpdated": "2024-08-07T20:26:46.508Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-4457 (GCVE-0-2005-4457)
Vulnerability from cvelistv5
Published
2005-12-21 11:00
Modified
2024-08-07 23:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several "..." (triple dot) sequences in a UID FETCH command.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/18134 | third-party-advisory, x_refsource_SECUNIA | |
http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:46:05.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "18134", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18134" }, { "name": "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-20T00:00:00", "descriptions": [ { "lang": "en", "value": "MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several \"...\" (triple dot) sequences in a UID FETCH command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-02-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "18134", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18134" }, { "name": "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4457", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several \"...\" (triple dot) sequences in a UID FETCH command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "18134", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18134" }, { "name": "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7", "refsource": "FULLDISC", "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4457", "datePublished": "2005-12-21T11:00:00", "dateReserved": "2005-12-21T00:00:00", "dateUpdated": "2024-08-07T23:46:05.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-1276 (GCVE-0-2008-1276)
Vulnerability from cvelistv5
Published
2008-03-10 23:00
Modified
2024-08-07 08:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/29277 | third-party-advisory, x_refsource_SECUNIA | |
http://aluigi.altervista.org/adv/maildisable-adv.txt | x_refsource_MISC | |
https://www.exploit-db.com/exploits/5249 | exploit, x_refsource_EXPLOIT-DB | |
http://www.vupen.com/english/advisories/2008/0799/references | vdb-entry, x_refsource_VUPEN | |
http://securityreason.com/securityalert/3724 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/489270/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id?1019565 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/28145 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41058 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:33.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29277" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt" }, { "name": "5249", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5249" }, { "name": "ADV-2008-0799", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0799/references" }, { "name": "3724", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3724" }, { "name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded" }, { "name": "1019565", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019565" }, { "name": "28145", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28145" }, { "name": "mailenable-imapservice-bo(41058)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29277" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt" }, { "name": "5249", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5249" }, { "name": "ADV-2008-0799", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0799/references" }, { "name": "3724", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3724" }, { "name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded" }, { "name": "1019565", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019565" }, { "name": "28145", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28145" }, { "name": "mailenable-imapservice-bo(41058)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1276", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29277", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29277" }, { "name": "http://aluigi.altervista.org/adv/maildisable-adv.txt", "refsource": "MISC", "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt" }, { "name": "5249", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5249" }, { "name": "ADV-2008-0799", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0799/references" }, { "name": "3724", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3724" }, { "name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded" }, { "name": "1019565", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019565" }, { "name": "28145", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28145" }, { "name": "mailenable-imapservice-bo(41058)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1276", "datePublished": "2008-03-10T23:00:00", "dateReserved": "2008-03-10T00:00:00", "dateUpdated": "2024-08-07T08:17:33.548Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-6997 (GCVE-0-2006-6997)
Vulnerability from cvelistv5
Published
2007-02-12 11:00
Modified
2024-09-17 02:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.
References
▼ | URL | Tags |
---|---|---|
http://www.mailenable.com/professionalhistory.asp | x_refsource_CONFIRM | |
http://www.mailenable.com/enterprisehistory.asp | x_refsource_CONFIRM | |
http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html | mailing-list, x_refsource_FULLDISC | |
http://www.mailenable.com/standardhistory.asp | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:50:05.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/standardhistory.asp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-02-12T11:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/standardhistory.asp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-6997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mailenable.com/professionalhistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "name": "http://www.mailenable.com/enterprisehistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html" }, { "name": "http://www.mailenable.com/standardhistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/standardhistory.asp" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-6997", "datePublished": "2007-02-12T11:00:00Z", "dateReserved": "2007-02-12T00:00:00Z", "dateUpdated": "2024-09-17T02:33:03.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-1277 (GCVE-0-2008-1277)
Vulnerability from cvelistv5
Published
2008-03-10 23:00
Modified
2024-08-07 08:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/29277 | third-party-advisory, x_refsource_SECUNIA | |
http://aluigi.altervista.org/adv/maildisable-adv.txt | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2008/0799/references | vdb-entry, x_refsource_VUPEN | |
http://securityreason.com/securityalert/3724 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/489270/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id?1019565 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/28145 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41059 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.437Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29277" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt" }, { "name": "ADV-2008-0799", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0799/references" }, { "name": "3724", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3724" }, { "name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded" }, { "name": "1019565", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019565" }, { "name": "28145", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28145" }, { "name": "mailenable-imapservice-dos(41059)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29277" }, { "tags": [ "x_refsource_MISC" ], "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt" }, { "name": "ADV-2008-0799", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0799/references" }, { "name": "3724", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3724" }, { "name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded" }, { "name": "1019565", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019565" }, { "name": "28145", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28145" }, { "name": "mailenable-imapservice-dos(41059)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1277", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29277", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29277" }, { "name": "http://aluigi.altervista.org/adv/maildisable-adv.txt", "refsource": "MISC", "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt" }, { "name": "ADV-2008-0799", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0799/references" }, { "name": "3724", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3724" }, { "name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded" }, { "name": "1019565", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019565" }, { "name": "28145", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28145" }, { "name": "mailenable-imapservice-dos(41059)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1277", "datePublished": "2008-03-10T23:00:00", "dateReserved": "2008-03-10T00:00:00", "dateUpdated": "2024-08-07T08:17:34.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-1301 (GCVE-0-2007-1301)
Vulnerability from cvelistv5
Published
2007-03-07 00:00
Modified
2024-08-07 12:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/0811 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32801 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/24361 | third-party-advisory, x_refsource_SECUNIA | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/22792 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1017739 | vdb-entry, x_refsource_SECTRACK | |
https://www.exploit-db.com/exploits/3397 | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:50:35.259Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-0811", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0811" }, { "name": "mailenable-append-bo(32801)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801" }, { "name": "24361", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "22792", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22792" }, { "name": "1017739", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017739" }, { "name": "3397", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/3397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-0811", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0811" }, { "name": "mailenable-append-bo(32801)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801" }, { "name": "24361", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "22792", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22792" }, { "name": "1017739", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017739" }, { "name": "3397", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/3397" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1301", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-0811", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0811" }, { "name": "mailenable-append-bo(32801)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801" }, { "name": "24361", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24361" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "22792", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22792" }, { "name": "1017739", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017739" }, { "name": "3397", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/3397" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1301", "datePublished": "2007-03-07T00:00:00", "dateReserved": "2007-03-06T00:00:00", "dateUpdated": "2024-08-07T12:50:35.259Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-1275 (GCVE-0-2008-1275)
Vulnerability from cvelistv5
Published
2008-03-10 23:00
Modified
2024-08-07 08:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/5235 | exploit, x_refsource_EXPLOIT-DB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41083 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/28154 | vdb-entry, x_refsource_BID | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2008/0800/references | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/29300 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.526Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "5235", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5235" }, { "name": "mailenable-expn-vrfy-dos(41083)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083" }, { "name": "28154", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28154" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "ADV-2008-0800", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0800/references" }, { "name": "29300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29300" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "5235", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5235" }, { "name": "mailenable-expn-vrfy-dos(41083)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083" }, { "name": "28154", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28154" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "ADV-2008-0800", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0800/references" }, { "name": "29300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29300" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1275", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "5235", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5235" }, { "name": "mailenable-expn-vrfy-dos(41083)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083" }, { "name": "28154", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28154" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "ADV-2008-0800", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0800/references" }, { "name": "29300", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29300" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1275", "datePublished": "2008-03-10T23:00:00", "dateReserved": "2008-03-10T00:00:00", "dateUpdated": "2024-08-07T08:17:34.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3155 (GCVE-0-2005-3155)
Vulnerability from cvelistv5
Published
2005-10-05 04:00
Modified
2024-08-07 23:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote attackers to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/15006 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1014999 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/17010 | third-party-advisory, x_refsource_SECUNIA | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:01:58.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "15006", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15006" }, { "name": "1014999", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014999" }, { "name": "17010", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17010" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote attackers to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-24T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "15006", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15006" }, { "name": "1014999", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014999" }, { "name": "17010", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17010" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3155", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote attackers to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "15006", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15006" }, { "name": "1014999", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014999" }, { "name": "17010", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17010" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3155", "datePublished": "2005-10-05T04:00:00", "dateReserved": "2005-10-05T00:00:00", "dateUpdated": "2024-08-07T23:01:58.599Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-4456 (GCVE-0-2005-4456)
Vulnerability from cvelistv5
Published
2005-12-21 11:00
Modified
2024-08-07 23:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands. NOTE: it is possible that these are alternate vectors for the issue described in CVE-2005-4402.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/18134 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/15985 | vdb-entry, x_refsource_BID | |
http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:46:05.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "18134", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18134" }, { "name": "15985", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15985" }, { "name": "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands. NOTE: it is possible that these are alternate vectors for the issue described in CVE-2005-4402." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-02-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "18134", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18134" }, { "name": "15985", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15985" }, { "name": "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4456", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands. NOTE: it is possible that these are alternate vectors for the issue described in CVE-2005-4402." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "18134", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18134" }, { "name": "15985", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15985" }, { "name": "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7", "refsource": "FULLDISC", "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4456", "datePublished": "2005-12-21T11:00:00", "dateReserved": "2005-12-21T00:00:00", "dateUpdated": "2024-08-07T23:46:05.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-4616 (GCVE-0-2006-4616)
Vulnerability from cvelistv5
Published
2006-09-07 00:00
Modified
2024-08-07 19:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2006/3669 | vdb-entry, x_refsource_VUPEN | |
http://securitytracker.com/id?1016792 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28910 | vdb-entry, x_refsource_XF | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/20091 | vdb-entry, x_refsource_BID | |
http://www.mailenable.com/hotfix/MESMTPC.ZIP | x_refsource_CONFIRM | |
http://secunia.com/advisories/21998 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:14:47.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-3669", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3669" }, { "name": "1016792", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016792" }, { "name": "mailenable-spf-dos(28910)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "20091", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20091" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP" }, { "name": "21998", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21998" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2006-3669", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3669" }, { "name": "1016792", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016792" }, { "name": "mailenable-spf-dos(28910)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "20091", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20091" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP" }, { "name": "21998", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21998" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4616", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-3669", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3669" }, { "name": "1016792", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016792" }, { "name": "mailenable-spf-dos(28910)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "20091", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20091" }, { "name": "http://www.mailenable.com/hotfix/MESMTPC.ZIP", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP" }, { "name": "21998", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21998" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4616", "datePublished": "2006-09-07T00:00:00", "dateReserved": "2006-09-06T00:00:00", "dateUpdated": "2024-08-07T19:14:47.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-1781 (GCVE-0-2005-1781)
Vulnerability from cvelistv5
Published
2005-05-31 04:00
Modified
2024-09-17 01:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unknown vulnerability in SMTP authentication for MailEnable allows remote attackers to cause a denial of service (crash).
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/15487 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:59:24.101Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "15487", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15487" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in SMTP authentication for MailEnable allows remote attackers to cause a denial of service (crash)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-05-31T04:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "15487", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15487" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1781", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in SMTP authentication for MailEnable allows remote attackers to cause a denial of service (crash)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "15487", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15487" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1781", "datePublished": "2005-05-31T04:00:00Z", "dateReserved": "2005-05-31T00:00:00Z", "dateUpdated": "2024-09-17T01:00:32.596Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3690 (GCVE-0-2005-3690)
Vulnerability from cvelistv5
Published
2005-11-19 01:00
Modified
2024-08-07 23:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (4) rename, (5) subscribe, or (6) unsubscribe commands.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/17633 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2005/2484 | vdb-entry, x_refsource_VUPEN | |
http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0581.html | mailing-list, x_refsource_FULLDISC | |
http://secunia.com/secunia_research/2005-59/advisory/ | x_refsource_MISC | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://securitytracker.com/id?1015239 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/23110 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/15492 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/20929 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:17:23.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "17633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17633" }, { "name": "ADV-2005-2484", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2484" }, { "name": "20051118 Secunia Research: MailEnable Buffer Overflow and Directory Traversal Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0581.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-59/advisory/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "1015239", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015239" }, { "name": "mailenable-imap-mailbox-bo(23110)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23110" }, { "name": "15492", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15492" }, { "name": "20929", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20929" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (4) rename, (5) subscribe, or (6) unsubscribe commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "17633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17633" }, { "name": "ADV-2005-2484", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2484" }, { "name": "20051118 Secunia Research: MailEnable Buffer Overflow and Directory Traversal Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0581.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-59/advisory/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "1015239", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015239" }, { "name": "mailenable-imap-mailbox-bo(23110)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23110" }, { "name": "15492", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15492" }, { "name": "20929", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20929" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3690", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (4) rename, (5) subscribe, or (6) unsubscribe commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "17633", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17633" }, { "name": "ADV-2005-2484", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2484" }, { "name": "20051118 Secunia Research: MailEnable Buffer Overflow and Directory Traversal Vulnerabilities", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0581.html" }, { "name": "http://secunia.com/secunia_research/2005-59/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-59/advisory/" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "1015239", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015239" }, { "name": "mailenable-imap-mailbox-bo(23110)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23110" }, { "name": "15492", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15492" }, { "name": "20929", "refsource": "OSVDB", "url": "http://www.osvdb.org/20929" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3690", "datePublished": "2005-11-19T01:00:00", "dateReserved": "2005-11-19T00:00:00", "dateUpdated": "2024-08-07T23:17:23.683Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-2194 (GCVE-0-2004-2194)
Vulnerability from cvelistv5
Published
2005-07-10 04:00
Modified
2024-08-08 01:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
MailEnable Professional Edition before 1.53 and Enterprise Edition before 1.02 allows remote attackers to cause a denial of service (crash) via malformed (1) SMTP or (2) IMAP commands.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/11418 | vdb-entry, x_refsource_BID | |
http://www.mailenable.com/professionalhistory.asp | x_refsource_CONFIRM | |
http://www.mailenable.com/enterprisehistory.asp | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:15:01.748Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "11418", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11418" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/enterprisehistory.asp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "MailEnable Professional Edition before 1.53 and Enterprise Edition before 1.02 allows remote attackers to cause a denial of service (crash) via malformed (1) SMTP or (2) IMAP commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-15T16:40:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "11418", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11418" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/enterprisehistory.asp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2194", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MailEnable Professional Edition before 1.53 and Enterprise Edition before 1.02 allows remote attackers to cause a denial of service (crash) via malformed (1) SMTP or (2) IMAP commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "11418", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11418" }, { "name": "http://www.mailenable.com/professionalhistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "name": "http://www.mailenable.com/enterprisehistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/enterprisehistory.asp" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2194", "datePublished": "2005-07-10T04:00:00", "dateReserved": "2005-07-11T00:00:00", "dateUpdated": "2024-08-08T01:15:01.748Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }