Vulnerabilites related to mailenable - mailenable_enterprise
Vulnerability from fkie_nvd
Published
2006-06-28 22:05
Modified
2025-04-03 01:03
Severity ?
Summary
The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument.
Impacted products
Vendor Product Version
mailenable mailenable_enterprise *
mailenable mailenable_enterprise *
mailenable mailenable_enterprise *
mailenable mailenable_enterprise *
mailenable mailenable_enterprise *
mailenable mailenable_enterprise *
mailenable mailenable_enterprise *
mailenable mailenable_enterprise *
mailenable mailenable_professional 1.0.004
mailenable mailenable_professional 1.0.005
mailenable mailenable_professional 1.0.006
mailenable mailenable_professional 1.0.007
mailenable mailenable_professional 1.0.008
mailenable mailenable_professional 1.0.009
mailenable mailenable_professional 1.0.010
mailenable mailenable_professional 1.0.011
mailenable mailenable_professional 1.0.012
mailenable mailenable_professional 1.0.013
mailenable mailenable_professional 1.0.014
mailenable mailenable_professional 1.0.015
mailenable mailenable_professional 1.0.016
mailenable mailenable_professional 1.0.017
mailenable mailenable_professional 1.1
mailenable mailenable_professional 1.2
mailenable mailenable_professional 1.2a
mailenable mailenable_professional 1.5
mailenable mailenable_professional 1.6
mailenable mailenable_professional 1.7
mailenable mailenable_professional 1.8
mailenable mailenable_professional 1.9
mailenable mailenable_professional 1.12
mailenable mailenable_professional 1.13
mailenable mailenable_professional 1.14
mailenable mailenable_professional 1.15
mailenable mailenable_professional 1.16
mailenable mailenable_professional 1.17
mailenable mailenable_professional 1.18
mailenable mailenable_professional 1.19
mailenable mailenable_professional 1.51
mailenable mailenable_professional 1.52
mailenable mailenable_professional 1.53
mailenable mailenable_professional 1.54
mailenable mailenable_professional 1.71
mailenable mailenable_professional 1.72
mailenable mailenable_professional 1.73
mailenable mailenable_professional 1.91
mailenable mailenable_professional 1.92
mailenable mailenable_professional 1.93
mailenable mailenable_professional 1.101
mailenable mailenable_professional 1.102
mailenable mailenable_professional 1.103
mailenable mailenable_professional 1.104
mailenable mailenable_professional 1.105
mailenable mailenable_professional 1.106
mailenable mailenable_professional 1.107
mailenable mailenable_professional 1.108
mailenable mailenable_professional 1.109
mailenable mailenable_professional 1.110
mailenable mailenable_professional 1.111
mailenable mailenable_professional 1.112
mailenable mailenable_professional 1.113
mailenable mailenable_professional 1.114
mailenable mailenable_professional 1.115
mailenable mailenable_professional 1.116
mailenable mailenable_professional 1.610
mailenable mailenable_professional 1.701
mailenable mailenable_professional 1.702
mailenable mailenable_professional 1.703
mailenable mailenable_professional 1.704
mailenable mailenable_professional 1.5015
mailenable mailenable_professional 1.5016
mailenable mailenable_professional 1.5017
mailenable mailenable_professional 1.5018



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD302C38-8169-458F-966C-F7D50E3452BD",
              "versionEndIncluding": "1.00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FC28A2B-2E07-42F3-A2D2-B6D73F45EC73",
              "versionEndIncluding": "1.01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D7F1033-3C99-4E4F-8068-910B23C0673F",
              "versionEndIncluding": "1.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "530449CF-D4A5-4F38-8C1D-F088A4C5170A",
              "versionEndIncluding": "1.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DF53C9E-8389-4AF1-881D-A67613CF3B3F",
              "versionEndIncluding": "1.02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5712D941-4D46-4F10-B12E-1FA036ACA6A2",
              "versionEndIncluding": "1.03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "358AEB41-C0E6-4A62-A31D-5600CF2056BC",
              "versionEndIncluding": "1.04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDBD081D-2E42-44EC-80D4-B602A03339F9",
              "versionEndIncluding": "1.21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.004:*:*:*:*:*:*:*",
              "matchCriteriaId": "D078B497-4C3C-4246-87C5-58DC5EEED452",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.005:*:*:*:*:*:*:*",
              "matchCriteriaId": "97DD9EC9-1A27-4A96-95A1-086DEA1E3890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.006:*:*:*:*:*:*:*",
              "matchCriteriaId": "193959CF-DAF3-4C62-8DB0-660115E1D41B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.007:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A827A0E-BDF2-4BAB-9F52-0014FE6E4B70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.008:*:*:*:*:*:*:*",
              "matchCriteriaId": "82CF54A9-CF50-4B23-8E3A-AFB08F7F98F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.009:*:*:*:*:*:*:*",
              "matchCriteriaId": "51BA53BA-CDF5-42EC-8D2B-EC24FDF82931",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.010:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B1E90C-AA06-4A89-90B3-0E7140F9B8DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.011:*:*:*:*:*:*:*",
              "matchCriteriaId": "060D809A-C603-4E06-9F57-3C76FEE6F86D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.012:*:*:*:*:*:*:*",
              "matchCriteriaId": "D53DE94B-0C32-4DDB-B13B-7B05208477AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.013:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A5EA901-CD07-464B-8EB0-8F845EDABAA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.014:*:*:*:*:*:*:*",
              "matchCriteriaId": "92B2611A-D7CF-441A-BA60-F27CF28BEB3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.015:*:*:*:*:*:*:*",
              "matchCriteriaId": "7139C2FC-4DA3-4193-B130-05524EB97C69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.016:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78B7FD6-2433-4EAA-8B3E-0507F81D54FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.0.017:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8B058B-F517-46C4-AC05-8EC258E38A75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF16E400-930E-4845-BB23-ED1217505302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB9A9BE-5EBD-4C06-BB95-942A65D58C68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F246E4-3B8B-475C-9DBE-49503C451EDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C8E86-F7CA-4217-A3C1-71CBE5CAB825",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D35AD18C-CA58-4DFC-A60F-49B698607B33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B219EBD1-B0E9-4599-B633-AA4C227E5854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "81249BA3-3D1D-4388-BE8D-28AB5CA3AFF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "771D029C-9F4A-41F9-8F86-F1B1BD38B329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A9222A-6F22-40BD-8411-69A90E8E46AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F4AADE9-F3FB-4272-8026-58FC677D3F3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD53801-B8F7-4AE8-BA2B-AC6297340CB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D0A401-2FB6-4720-B0AF-550FB71FBAD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2057482-7505-472E-8EF4-300B2A26AB7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED2AC32-5485-4707-9E15-903BDD556719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.101:*:*:*:*:*:*:*",
              "matchCriteriaId": "652E1512-B1B1-44B5-93CF-9C526B95BA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "2835FBA2-79E4-4541-913C-21BAD3320D55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.103:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9449E3-1CEA-40AF-BD00-94B56E38AF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.104:*:*:*:*:*:*:*",
              "matchCriteriaId": "39724984-2A10-441F-A103-2DFA693F4F19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.105:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01DB7FF-7171-43D2-96F3-E5C0AABA4877",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.106:*:*:*:*:*:*:*",
              "matchCriteriaId": "77B95FCC-55C7-4B44-B8C7-85792C7E91BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.107:*:*:*:*:*:*:*",
              "matchCriteriaId": "16E07556-02E5-42FA-9338-3176EB2ED536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.108:*:*:*:*:*:*:*",
              "matchCriteriaId": "539C5F71-83FC-455C-8180-72C9F1E2C4A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.109:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C4D762-BF84-4734-B9AD-ED9F3FB85D0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.110:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B410FC-650E-4E51-8634-D99113E8B1AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.111:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C6B358-93A6-4A9A-B284-9DFA9C981620",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.112:*:*:*:*:*:*:*",
              "matchCriteriaId": "2638B249-E955-48B3-A309-EF92737E015D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.113:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F275DA6-7799-4B51-8F9C-DD23E8A3C5AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.114:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FB961BA-8FAB-4FC5-B582-AF758E7D0E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.115:*:*:*:*:*:*:*",
              "matchCriteriaId": "A400F721-435F-4EBA-8BC2-92E4769A35A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.116:*:*:*:*:*:*:*",
              "matchCriteriaId": "61206A1A-FF1A-4A45-8952-509168BD8495",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.610:*:*:*:*:*:*:*",
              "matchCriteriaId": "6618B6DC-77E8-441E-B3A2-AEFFAADCD702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.701:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FFC8653-88CB-4AD9-B2C6-6D1F73354222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.702:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D6B18C1-6D0D-4E4C-BE98-1337061847CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.703:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B0481E8-356F-404B-8931-30FA058564CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.704:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B5C969-EDB7-4839-8CD2-23F88A4F3BEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5015:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FEA17FF-5E97-4E57-9AE0-132D26600AFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5016:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD596361-5520-4CDC-A96C-B19B8DEA6919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5017:*:*:*:*:*:*:*",
              "matchCriteriaId": "0465E63F-584D-47FC-9081-B03FBDA2B6EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5018:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5879495-DB93-4F1A-B48F-369F198492AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument."
    },
    {
      "lang": "es",
      "value": "El servicio SMTP de MailEnable Standard v1.92 y anteriores, Professional v2.0 y anteriores, y Enterprise v2.0 y versiones anteriores, antes de MESMTPC hotfix,permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de programa) a trav\u00e9s del comando HELO con un byte nulo en el argumento, probablemente lanzando una inconsistencia de longitud o p\u00e9rdida de argumento."
    }
  ],
  "id": "CVE-2006-3277",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-06-28T22:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20790"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016376"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.divisionbyzero.be/?p=173"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.divisionbyzero.be/?p=174"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/mesmtpc.zip"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26791"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/438374/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/18630"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/2520"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27387"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20790"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016376"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.divisionbyzero.be/?p=173"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.divisionbyzero.be/?p=174"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/mesmtpc.zip"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26791"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/438374/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/18630"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/2520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27387"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-31 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in SMTP authentication for MailEnable allows remote attackers to cause a denial of service (crash).



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unknown vulnerability in SMTP authentication for MailEnable allows remote attackers to cause a denial of service (crash)."
    }
  ],
  "id": "CVE-2005-1781",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-31T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15487"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/15487"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-02-01 22:02
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in MailEnable Enterprise Edition before 1.2 allows remote attackers to cause a denial of service (CPU utilization) by viewing "formatted quoted-printable emails" via webmail.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in MailEnable Enterprise Edition before 1.2 allows remote attackers to cause a denial of service (CPU utilization) by viewing \"formatted quoted-printable emails\" via webmail."
    }
  ],
  "id": "CVE-2006-0504",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-02-01T22:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18716"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18716"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24517"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "358AEB41-C0E6-4A62-A31D-5600CF2056BC",
              "versionEndIncluding": "1.04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4DB22E1-238F-41A3-98D6-6EF5C31EB972",
              "versionEndIncluding": "1.54",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header."
    }
  ],
  "id": "CVE-2005-1348",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=111445834220015\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1013786"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/15737"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "URL Repurposed"
      ],
      "url": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=111445834220015\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1013786"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/15737"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "URL Repurposed"
      ],
      "url": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-10-10 04:06
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via "the signature field of NTLM Type 1 messages".
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ABEB364-389B-46AF-B04F-88EC3AF9DB8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FD7082-AC93-426F-9DA7-50CBFFDAC07A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via \"the signature field of NTLM Type 1 messages\"."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en la validaci\u00f3n NTLM enMailEnable Professional 2.0 y Enterprise 2.0  permite a un atacante remoto ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de \"el campo de mensajes de firma de NTLM Tipo 1\"."
    }
  ],
  "evaluatorSolution": "Hotfixes are available on the vendor web site that address this and related vulnerabilities.",
  "id": "CVE-2006-5176",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-10-10T04:06:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22179"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/20290"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3862"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/20290"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3862"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29284"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-12-19 19:28
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D4ECC9C-9D19-41F8-8A9A-86CDAAF591AB",
              "versionEndIncluding": "2.35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D83D1EA7-A3D6-41AA-B922-18885328D292",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7173C4E7-ACB7-4277-B4E8-79E655B97EEF",
              "versionEndIncluding": "2.35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "201B610A-DD27-48D2-A3EF-DFEBBDEA04BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AAE8D3D-FF57-49B1-AE03-3ADB815A5DE8",
              "versionEndIncluding": "1.98",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en el servicio POP de MailEnable Standard 1.98 y anteriores ; Professional 1.84, y 2.35 y anteriores; y Enterprise 1.41, y 2.35 y anteriores a ME-10026 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un argumento largo al comando PASS."
    }
  ],
  "id": "CVE-2006-6605",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-19T19:28:00.000",
  "references": [
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23127"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-75/advisory/"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://securityreason.com/securityalert/2053"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://securitytracker.com/id?1017395"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/bid/21645"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2006/5052"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23127"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-75/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2053"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017395"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/21645"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/5052"
    }
  ],
  "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-10 23:44
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6496BBB-BF66-4CA5-B1E1-BF65D58DEB0E",
              "versionEndIncluding": "3.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C4F770-9BCC-42AB-B04C-3ACD60357472",
              "versionEndIncluding": "3.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de desbordamiento de b\u00fafer en el Servicio IMAP  (MEIMAPS.EXE) de MailEnable Professional Edition y Enterprise Edition 3.13 y anteriores, permite a atacantes autenticados remotamente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de argumentos largos hacia los comandos (1) FETCH, (2) EXAMINE y (3) UNSUBSCRIBE."
    }
  ],
  "id": "CVE-2008-1276",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-10T23:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29277"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3724"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/28145"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019565"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0799/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5249"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3724"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/28145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0799/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5249"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-12-05 11:28
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.
References
cve@mitre.orghttp://secunia.com/advisories/23047
cve@mitre.orghttp://secunia.com/advisories/23080
cve@mitre.orghttp://secunia.com/secunia_research/2006-71/advisory/Patch, Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1017276
cve@mitre.orghttp://securitytracker.com/id?1017319
cve@mitre.orghttp://www.mailenable.com/hotfix/Patch
cve@mitre.orghttp://www.securityfocus.com/archive/1/453118/100/100/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/21362
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/4673
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/4778
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/30614
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23047
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23080
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-71/advisory/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017276
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017319
af854a3a-2127-422b-91ae-364da2661108http://www.mailenable.com/hotfix/Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/453118/100/100/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/21362
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4673
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4778
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/30614
Impacted products
Vendor Product Version
mailenable mailenable_enterprise 1.1
mailenable mailenable_enterprise 1.2
mailenable mailenable_enterprise 1.11
mailenable mailenable_enterprise 1.12
mailenable mailenable_enterprise 1.13
mailenable mailenable_enterprise 1.14
mailenable mailenable_enterprise 1.15
mailenable mailenable_enterprise 1.16
mailenable mailenable_enterprise 1.17
mailenable mailenable_enterprise 1.18
mailenable mailenable_enterprise 1.19
mailenable mailenable_enterprise 1.21
mailenable mailenable_enterprise 1.22
mailenable mailenable_enterprise 1.23
mailenable mailenable_enterprise 1.24
mailenable mailenable_enterprise 1.25
mailenable mailenable_enterprise 1.26
mailenable mailenable_enterprise 1.27
mailenable mailenable_enterprise 1.28
mailenable mailenable_enterprise 1.29
mailenable mailenable_enterprise 1.30
mailenable mailenable_enterprise 2.0
mailenable mailenable_enterprise 2.1
mailenable mailenable_enterprise 2.01
mailenable mailenable_enterprise 2.2
mailenable mailenable_enterprise 2.03
mailenable mailenable_enterprise 2.04
mailenable mailenable_enterprise 2.05
mailenable mailenable_enterprise 2.06
mailenable mailenable_enterprise 2.07
mailenable mailenable_enterprise 2.08
mailenable mailenable_enterprise 2.09
mailenable mailenable_enterprise 2.11
mailenable mailenable_enterprise 2.12
mailenable mailenable_enterprise 2.13
mailenable mailenable_enterprise 2.14
mailenable mailenable_enterprise 2.15
mailenable mailenable_enterprise 2.16
mailenable mailenable_enterprise 2.17
mailenable mailenable_enterprise 2.18
mailenable mailenable_enterprise 2.19
mailenable mailenable_enterprise 2.21
mailenable mailenable_enterprise 2.22
mailenable mailenable_enterprise 2.23
mailenable mailenable_enterprise 2.24
mailenable mailenable_enterprise 2.25
mailenable mailenable_enterprise 2.26
mailenable mailenable_enterprise 2.27
mailenable mailenable_enterprise 2.28
mailenable mailenable_enterprise 2.29
mailenable mailenable_enterprise 2.30
mailenable mailenable_enterprise 2.31
mailenable mailenable_enterprise 2.32
mailenable mailenable_enterprise 2.33
mailenable mailenable_professional 1.6
mailenable mailenable_professional 1.82
mailenable mailenable_professional 2.0
mailenable mailenable_professional 2.33



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB6FB230-80C5-4B8D-898E-8C298B2207C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A640E156-FF31-48E6-9D98-E2E669C01C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "04B96ED6-16EB-42A4-BDC6-0EE45EA38B62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "455DD7A6-A83E-4200-B41B-505118FE8E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A5462F1-B6D9-43F0-982C-2E4534E79E02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3248B134-BF1F-4109-A0DC-DF9A01CC8156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "849A1A19-83BA-4984-947B-C47DAA515908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E3C2B12-AF3A-44D9-9C91-58F4AB1FE188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A25D16-21ED-4EAD-A535-6000E77ECF35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC5AC063-9D7B-45A2-9D90-B85E2DFBB6F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD73FDB9-4A1E-4A8A-A541-21C7726A152C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "1491392B-467F-4CA0-B6D7-2A7478C4DFA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3F71BC-639F-4966-B05D-5E3BB9C5FA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "056C7707-A07C-4F4A-8390-97885581802F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "0025F745-D34D-4275-9A3B-5530B7A0A520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFB9ECA3-FFF5-447D-B685-666669410D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "B56A4283-E0DB-42CE-9551-FC3DBC7E50A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F80F2B0F-8461-47C3-A07A-98681D255478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ABEB364-389B-46AF-B04F-88EC3AF9DB8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "35DD2182-B2D2-4BFB-BEE9-A9F0F8666791",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "E89D25B0-6924-4561-A056-972F80740E23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C72359EA-1289-456C-BEB0-F7C910DE1A2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB079D44-2AD7-44B1-A8A8-AF8166CEED45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0F70886-33C4-419B-BF7E-26EAB3DDD1AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "574E97CD-A04F-4BE8-86AA-07B9275D583D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB8D602E-C0A9-4134-90E2-18FA49741563",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9CA827C-43C6-4EA4-AF50-984E0EE035AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "95859193-BD9A-43D2-AD49-F405F5ACB44F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "C880FF94-935E-4023-82A3-E2CD62E13BAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "395D0374-CEB6-4D59-BAB5-499C6E90BBCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "78486120-1FBD-454B-8CC7-5727889E66B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "52A55CDE-4AF8-4458-8E72-426588A46188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2296B9-4F7E-491A-B209-6D79BC5C9105",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "2074C3AE-08BF-49A0-BE7E-065671BF8742",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1FA7867-EACD-43BD-9D5A-CFA5EAB8CAEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14B554F-92D2-41DA-B57F-830447161948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E08ADC5-7B68-4440-BA96-0B97E360C3E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD43B0A5-5440-46B2-AC91-0565F9E08AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAD474D9-182E-4572-9F8F-652756189721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "54CC311F-0F3F-4465-84ED-D2BA24632819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF0DCBB-F15A-4443-82B1-DF71CA06551D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "31732C13-5587-43FC-89CE-30DEC4E8D30B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "29DDED08-3561-48C1-94E6-F27F2DA18FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "66B3190A-FE7C-430C-9B80-3228803085E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "16948701-ED10-440B-9B59-D8D51C7C031F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "891E7776-DEBD-4282-86C7-22F59F73B216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "A62419C7-789F-4131-BE98-3B546E946F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC923FB9-90C6-4433-BF94-CF87FA2255BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF0E9D73-4283-44AE-BFB9-159FE84580A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "84ACF997-81AF-45EC-9200-2C63B37D93D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DC2DF4F-7D02-4BCE-BD59-5482EFF9262C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F785125-F530-4674-B2B3-0D97E8397391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FD7082-AC93-426F-9DA7-50CBFFDAC07A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E5107B-BDC2-4972-A3A4-AA6782E46B0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer basados en pila en el m\u00f3dulo IMAP (MEIMAPS.EXE) de MailEnable Professional 1.6 hasta 1.82 y 2.0 hasta 2.33, y MailEnable Enterprise 1.1 hasta 1.30 y 2.0 hasta 2.33 permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (ca\u00edda) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un argumento largo a los comandos (1) EXAMINE o (2) SELECT."
    }
  ],
  "id": "CVE-2006-6290",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-05T11:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23047"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23080"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-71/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1017276"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1017319"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/21362"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/4673"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/4778"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-71/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017276"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017319"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/21362"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/4673"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/4778"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-11-26 02:03
Modified
2025-04-03 01:03
Severity ?
Summary
IMAP service (meimaps.exe) of MailEnable Professional 1.7 and Enterprise 1.1 allows remote authenticated attackers to cause a denial of service (application crash) by using RENAME with a non-existent mailbox, a different vulnerability than CVE-2005-3690.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IMAP service (meimaps.exe) of MailEnable Professional 1.7 and Enterprise 1.1 allows remote authenticated attackers to cause a denial of service (application crash) by using RENAME with a non-existent mailbox, a different vulnerability than CVE-2005-3690."
    }
  ],
  "id": "CVE-2005-3813",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-11-26T02:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113285451031500\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17740"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/205"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015268"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/21109"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/417589/30/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/15556"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2579"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://zur.homelinux.com/Advisories/MailEnableImapDos.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113285451031500\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17740"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/205"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015268"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/21109"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/417589/30/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/15556"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://zur.homelinux.com/Advisories/MailEnableImapDos.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-12-21 11:03
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands. NOTE: it is possible that these are alternate vectors for the issue described in CVE-2005-4402.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A9222A-6F22-40BD-8411-69A90E8E46AA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands.  NOTE: it is possible that these are alternate vectors for the issue described in CVE-2005-4402."
    }
  ],
  "id": "CVE-2005-4456",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-21T11:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18134"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/15985"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18134"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/15985"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-10 23:44
Modified
2025-04-09 00:30
Severity ?
Summary
The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6496BBB-BF66-4CA5-B1E1-BF65D58DEB0E",
              "versionEndIncluding": "3.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C4F770-9BCC-42AB-B04C-3ACD60357472",
              "versionEndIncluding": "3.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference."
    },
    {
      "lang": "es",
      "value": "El servicio IMAP (MEIMAPS.exe) en MailEnable Professional Edition y Enterprise Edition 3.13 y anteriores, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de los comandos (1) SEARCH y (2) APPEND que no tengan los argumentos requeridos, esto induce a una referencia a puntero nulo."
    }
  ],
  "id": "CVE-2008-1277",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-10T23:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29277"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3724"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/28145"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019565"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0799/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3724"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/28145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0799/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-03-07 00:19
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "794B82C8-E0B2-4B79-BF36-3FB9E09AE5FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.37:*:professional:*:*:*:*:*",
              "matchCriteriaId": "6DC1B3DE-6F03-47BA-AF5C-CDA53120AF41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command.  NOTE: this is probably different than CVE-2006-6423."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en el servicio IMAP de MailEnable ediciones Enterprise y Professional 2.37 y anteriores permite a usuarios remotos autenticados ejecutar c\u00f3digo de su elecci\u00f3n mediante una argumento largo al comando APPEND. NOTA: esta vulnerabilidad es, probablemente, diferente que CVE-2006-6423."
    }
  ],
  "id": "CVE-2007-1301",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-03-07T00:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24361"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/22792"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1017739"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/0811"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/3397"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24361"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/22792"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1017739"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/3397"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-11-19 01:03
Modified
2025-04-03 01:03
Severity ?
Summary
Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail directories via the mailbox name argument of the (1) create or (2) rename commands.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B880760-D0E3-46C6-A12F-3D9A444C92C1",
              "versionEndIncluding": "1.6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail directories via the mailbox name argument of the (1) create or (2) rename commands."
    }
  ],
  "id": "CVE-2005-3691",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-11-19T01:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17633"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-59/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015239"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15494"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2484"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17633"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-59/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15494"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2484"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-04-15 10:02
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A9222A-6F22-40BD-8411-69A90E8E46AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F4AADE9-F3FB-4272-8026-58FC677D3F3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD53801-B8F7-4AE8-BA2B-AC6297340CB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E00689-F421-4B3B-96D7-14DC66DB42B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B4AA11-F7A1-4297-B6B7-68A815FCE189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1517796-B826-40A3-9654-3BA1DA4E4CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "735523E7-25D9-4541-B389-D1098052F841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "E67F8892-2A24-4EF4-ABFA-E7651DF4C5E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*",
              "matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\".  NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
    }
  ],
  "id": "CVE-2006-1792",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-04-15T10:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mailenable.com/standardhistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mailenable.com/standardhistory.asp"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-11-19 01:03
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (4) rename, (5) subscribe, or (6) unsubscribe commands.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D7F1033-3C99-4E4F-8068-910B23C0673F",
              "versionEndIncluding": "1.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B880760-D0E3-46C6-A12F-3D9A444C92C1",
              "versionEndIncluding": "1.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (4) rename, (5) subscribe, or (6) unsubscribe commands."
    }
  ],
  "id": "CVE-2005-3690",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-11-19T01:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0581.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17633"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-59/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015239"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/20929"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15492"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2484"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0581.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17633"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-59/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/20929"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15492"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2484"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23110"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the IMAP service for MailEnable Enterprise 1.04 and earlier and Professional 1.54 allows remote attackers to execute arbitrary code via a long AUTHENTICATE command.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E228B31-0D62-41E3-A475-550BBFAA4336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the IMAP service for MailEnable Enterprise 1.04 and earlier and Professional 1.54 allows remote attackers to execute arbitrary code via a long AUTHENTICATE command."
    }
  ],
  "id": "CVE-2005-1014",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033123.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14812"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1013637"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12995"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19947"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033123.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14812"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1013637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12995"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19947"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-09-07 00:04
Modified
2025-04-03 01:03
Severity ?
Summary
SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "794B82C8-E0B2-4B79-BF36-3FB9E09AE5FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F99747EE-1CD0-4DD1-93BD-ACA95EC5B2CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B924438E-5E77-43D5-873C-70F1B2FE4191",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception."
    },
    {
      "lang": "es",
      "value": "El servicio SMTP en MailEnable Standard, Professional, y Enterprise anterior a ME-10014 (04/09/2006) permite a un atacante remoto provocar denegaci\u00f3n de servicio a trav\u00e9s de una b\u00fasqueda SPF para un dominio con un gran n\u00famero de registros, lo cual dispara una excepci\u00f3n de puntero nulo."
    }
  ],
  "id": "CVE-2006-4616",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-09-07T00:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21998"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016792"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/20091"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3669"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21998"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016792"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/20091"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3669"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The SMTP service in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to cause a denial of service (server crash) via an EHLO command with a Unicode string.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SMTP service in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to cause a denial of service (server crash) via an EHLO command with a Unicode string."
    }
  ],
  "id": "CVE-2005-1013",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=111273637518494\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/14812"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1013637"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/15232"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securiteam.com/windowsntfocus/5HP031PFFG.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12994"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19948"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19973"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=111273637518494\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/14812"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1013637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/15232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securiteam.com/windowsntfocus/5HP031PFFG.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12994"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19948"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19973"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-12-12 20:28
Modified
2025-04-09 00:30
Severity ?
Summary
The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information.
Impacted products
Vendor Product Version
mailenable mailenable_enterprise 1.1
mailenable mailenable_enterprise 1.2
mailenable mailenable_enterprise 1.11
mailenable mailenable_enterprise 1.12
mailenable mailenable_enterprise 1.13
mailenable mailenable_enterprise 1.14
mailenable mailenable_enterprise 1.15
mailenable mailenable_enterprise 1.16
mailenable mailenable_enterprise 1.17
mailenable mailenable_enterprise 1.18
mailenable mailenable_enterprise 1.19
mailenable mailenable_enterprise 1.21
mailenable mailenable_enterprise 1.22
mailenable mailenable_enterprise 1.23
mailenable mailenable_enterprise 1.24
mailenable mailenable_enterprise 1.25
mailenable mailenable_enterprise 1.26
mailenable mailenable_enterprise 1.27
mailenable mailenable_enterprise 1.28
mailenable mailenable_enterprise 1.29
mailenable mailenable_enterprise 1.30
mailenable mailenable_enterprise 1.31
mailenable mailenable_enterprise 1.32
mailenable mailenable_enterprise 1.33
mailenable mailenable_enterprise 1.34
mailenable mailenable_enterprise 1.35
mailenable mailenable_enterprise 1.36
mailenable mailenable_enterprise 1.37
mailenable mailenable_enterprise 1.38
mailenable mailenable_enterprise 1.39
mailenable mailenable_enterprise 1.40
mailenable mailenable_enterprise 2.0
mailenable mailenable_enterprise 2.1
mailenable mailenable_enterprise 2.2
mailenable mailenable_enterprise 2.32
mailenable mailenable_enterprise 2.33
mailenable mailenable_enterprise 2.34
mailenable mailenable_professional 1.6
mailenable mailenable_professional 1.7
mailenable mailenable_professional 1.72
mailenable mailenable_professional 1.73
mailenable mailenable_professional 1.82
mailenable mailenable_professional 1.83
mailenable mailenable_professional 2.0
mailenable mailenable_professional 2.1
mailenable mailenable_professional 2.2
mailenable mailenable_professional 2.32
mailenable mailenable_professional 2.33
mailenable mailenable_professional 2.34



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB6FB230-80C5-4B8D-898E-8C298B2207C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A640E156-FF31-48E6-9D98-E2E669C01C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "04B96ED6-16EB-42A4-BDC6-0EE45EA38B62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "455DD7A6-A83E-4200-B41B-505118FE8E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A5462F1-B6D9-43F0-982C-2E4534E79E02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3248B134-BF1F-4109-A0DC-DF9A01CC8156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "849A1A19-83BA-4984-947B-C47DAA515908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E3C2B12-AF3A-44D9-9C91-58F4AB1FE188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A25D16-21ED-4EAD-A535-6000E77ECF35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC5AC063-9D7B-45A2-9D90-B85E2DFBB6F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD73FDB9-4A1E-4A8A-A541-21C7726A152C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "1491392B-467F-4CA0-B6D7-2A7478C4DFA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3F71BC-639F-4966-B05D-5E3BB9C5FA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "056C7707-A07C-4F4A-8390-97885581802F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "0025F745-D34D-4275-9A3B-5530B7A0A520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFB9ECA3-FFF5-447D-B685-666669410D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "B56A4283-E0DB-42CE-9551-FC3DBC7E50A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F80F2B0F-8461-47C3-A07A-98681D255478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2E1599A-9928-4A06-B650-1238D62CD2C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "E07825D6-EBA0-42B5-BE18-DA3D440A986D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C153370-5AD2-4020-9656-5BDD7644F692",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "50451621-1AF5-4A17-9355-62D78DDAE7A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC62336F-5F8F-4FF7-B2FB-CBBBAEC77162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "75BF5AF2-FAD4-48B4-B893-035F5A82A58D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F5CF79-543F-4ECA-B5A3-5212A1D0A18E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "D80141E2-F98C-458C-BAFB-8272BD2BBE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA17BD7-A9FC-4FA3-88D4-38D9BD197963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "393240E7-FE4F-4535-B5F0-6609F4A01646",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ABEB364-389B-46AF-B04F-88EC3AF9DB8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "35DD2182-B2D2-4BFB-BEE9-A9F0F8666791",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C72359EA-1289-456C-BEB0-F7C910DE1A2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "84ACF997-81AF-45EC-9200-2C63B37D93D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DC2DF4F-7D02-4BCE-BD59-5482EFF9262C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3FEF237-35BB-4298-B458-B933472D028B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F4AADE9-F3FB-4272-8026-58FC677D3F3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD53801-B8F7-4AE8-BA2B-AC6297340CB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F785125-F530-4674-B2B3-0D97E8397391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F59A308-7D1A-4C4F-A34C-27FDCF12E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FD7082-AC93-426F-9DA7-50CBFFDAC07A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB0576FE-F0BC-4DA7-B007-7DA49F369700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2826B3D-44E0-4D4B-A681-8C3DADF522F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "662AEDE4-698E-4C78-93B4-4B915749DF80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E5107B-BDC2-4972-A3A4-AA6782E46B0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "6739BEA4-C75F-476E-AF5D-449D8236E042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423.  NOTE: some details were obtained from third party information."
    },
    {
      "lang": "es",
      "value": "El servicio IMAP para el MailEnable Professional y Enterprise Edition de la 2.0 a la 2.34 inclusive, Professional Edition de la 1.6 a la 1.83 inclusive, and Enterprise Edition de la 1.1 a la 1.40 inclusive, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante vectores sin especificar que disparan una referencia a un puntero nulo, como la tratada en el ME-10023 hotfix y diferente a la CVE-2006-6423. NOTA: algunos detalles se obtienen a partir de la informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2006-6484",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-12T20:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23267"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/21493"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23267"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/21493"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-02-12 11:28
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E228B31-0D62-41E3-A475-550BBFAA4336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*",
              "matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors.  NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la caracter\u00edstica cryptographic en MailEnable Standard Edition anetrior a 1.93, Professional Edition anterior a 1.73, y Enterprise Edition anterior a 1.21 lleva a \"validaci\u00f3n de seguridad debil\" con un impacto desconocido y vectores de ataque, NOTA: debido a la escasez de detalles, no es\u00e1 claro si esto es lo mismo que CVE-2006-1792."
    }
  ],
  "id": "CVE-2006-6997",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-02-12T11:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/standardhistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/standardhistory.asp"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-12-20 11:03
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in MailEnable Professional 1.71 and earlier, and Enterprise 1.1 and earlier, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D7F1033-3C99-4E4F-8068-910B23C0673F",
              "versionEndIncluding": "1.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9625752-74A8-417F-9125-C6BB2EC27E16",
              "versionEndIncluding": "1.71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in MailEnable Professional 1.71 and earlier, and Enterprise 1.1 and earlier, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command."
    }
  ],
  "id": "CVE-2005-4402",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-20T11:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113502692010867\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/alerts/2005/Dec/1015378.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2988"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113502692010867\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/alerts/2005/Dec/1015378.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2988"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote attackers to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection.
References
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote attackers to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection."
    }
  ],
  "id": "CVE-2004-2501",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/13318"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1012327"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.hat-squad.com/en/000102.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/12135"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/12136"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/11755"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18285"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18286"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/13318"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1012327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.hat-squad.com/en/000102.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/12135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/12136"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/11755"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18285"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18286"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-12-05 00:03
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple unspecified vulnerabilities in MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allow attackers to cause a denial of service (crash) via invalid IMAP commands.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B880760-D0E3-46C6-A12F-3D9A444C92C1",
              "versionEndIncluding": "1.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allow attackers to cause a denial of service (crash) via invalid IMAP commands."
    }
  ],
  "id": "CVE-2005-3993",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-05T00:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17820"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/21388"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2704"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17820"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/21388"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2704"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-12-12 02:28
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB6FB230-80C5-4B8D-898E-8C298B2207C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A640E156-FF31-48E6-9D98-E2E669C01C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "04B96ED6-16EB-42A4-BDC6-0EE45EA38B62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "455DD7A6-A83E-4200-B41B-505118FE8E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A5462F1-B6D9-43F0-982C-2E4534E79E02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3248B134-BF1F-4109-A0DC-DF9A01CC8156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "849A1A19-83BA-4984-947B-C47DAA515908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E3C2B12-AF3A-44D9-9C91-58F4AB1FE188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A25D16-21ED-4EAD-A535-6000E77ECF35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC5AC063-9D7B-45A2-9D90-B85E2DFBB6F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD73FDB9-4A1E-4A8A-A541-21C7726A152C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "1491392B-467F-4CA0-B6D7-2A7478C4DFA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3F71BC-639F-4966-B05D-5E3BB9C5FA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "056C7707-A07C-4F4A-8390-97885581802F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "0025F745-D34D-4275-9A3B-5530B7A0A520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFB9ECA3-FFF5-447D-B685-666669410D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "B56A4283-E0DB-42CE-9551-FC3DBC7E50A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F80F2B0F-8461-47C3-A07A-98681D255478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2E1599A-9928-4A06-B650-1238D62CD2C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "E07825D6-EBA0-42B5-BE18-DA3D440A986D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C153370-5AD2-4020-9656-5BDD7644F692",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "50451621-1AF5-4A17-9355-62D78DDAE7A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC62336F-5F8F-4FF7-B2FB-CBBBAEC77162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "75BF5AF2-FAD4-48B4-B893-035F5A82A58D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F5CF79-543F-4ECA-B5A3-5212A1D0A18E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "D80141E2-F98C-458C-BAFB-8272BD2BBE4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA17BD7-A9FC-4FA3-88D4-38D9BD197963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "393240E7-FE4F-4535-B5F0-6609F4A01646",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D83D1EA7-A3D6-41AA-B922-18885328D292",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0743346-9637-498F-BAAF-B193E41A7927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "201B610A-DD27-48D2-A3EF-DFEBBDEA04BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en el servicio IMAP para MailEnable Professional y Enterprise Edition 2.0 hasta 2.35, Professional Edition 1.6 hasta 1.84, y Enterprise Edition 1.1 hasta 1.41 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un comando de pre-autenticaci\u00f3n seguido de un par\u00e1metro manipulado y una cadena larga como se indica en la actualizaci\u00f3n r\u00e1pida (hotfix) ME-10025"
    }
  ],
  "id": "CVE-2006-6423",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-12T02:28:00.000",
  "references": [
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/23201"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-73/advisory/"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://securityreason.com/securityalert/2022"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/bid/21492"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23201"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-73/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/21492"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796"
    }
  ],
  "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-10 23:44
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDBCAC5-9215-487B-BFC1-A55982352714",
              "versionEndIncluding": "3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77ED3854-23DD-4153-8A40-F26F975CAE72",
              "versionEndIncluding": "3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B924438E-5E77-43D5-873C-70F1B2FE4191",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en el servicio SMTP de MailEnable Standard Edition 1.x, Professional Edition 3.x y anteriores, y Enterprise Edition 3.x y anteriores, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante los comandos manipulados (1) EXPN o (2) VRFY."
    }
  ],
  "id": "CVE-2008-1275",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-10T23:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29300"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/28154"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0800/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5235"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29300"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/28154"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0800/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5235"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-12-21 11:03
Modified
2025-04-03 01:03
Severity ?
Summary
MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several "..." (triple dot) sequences in a UID FETCH command.
Impacted products
Vendor Product Version
mailenable mailenable_enterprise 1.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several \"...\" (triple dot) sequences in a UID FETCH command."
    }
  ],
  "id": "CVE-2005-4457",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-21T11:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18134"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18134"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
MailEnable Professional Edition before 1.53 and Enterprise Edition before 1.02 allows remote attackers to cause a denial of service (crash) via malformed (1) SMTP or (2) IMAP commands.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51327559-08C8-4957-925C-B1DCE15C9423",
              "versionEndIncluding": "1.26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E228B31-0D62-41E3-A475-550BBFAA4336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MailEnable Professional Edition before 1.53 and Enterprise Edition before 1.02 allows remote attackers to cause a denial of service (crash) via malformed (1) SMTP or (2) IMAP commands."
    }
  ],
  "id": "CVE-2004-2194",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/11418"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/11418"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-03-21 02:06
Modified
2025-04-03 01:03
Severity ?
Summary
Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving "incorrectly encoded quoted-printable emails".



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A9222A-6F22-40BD-8411-69A90E8E46AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F4AADE9-F3FB-4272-8026-58FC677D3F3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving \"incorrectly encoded quoted-printable emails\"."
    }
  ],
  "id": "CVE-2006-1338",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-03-21T02:06:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19288"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/24014"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/17161"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/1006"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25315"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19288"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/24014"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17161"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/1006"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25315"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-10-10 04:06
Modified
2025-04-09 00:30
Severity ?
Summary
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ABEB364-389B-46AF-B04F-88EC3AF9DB8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FD7082-AC93-426F-9DA7-50CBFFDAC07A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n NTLM en MailEnable Professional 2.0 y Enterprise 2.0 permite a un atacante remoto (1)ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados que afectan a codificaci\u00f3n artesanal base64 mensajes NTLM Tipo 3, o (2) provoca denegaci\u00f3n de servicio a trav\u00e9s de la codificaci\u00f3n base64 de mensajes NTLM Tipo 1, lo cual dispara una sobre lectura de b\u00fafer."
    }
  ],
  "id": "CVE-2006-5177",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-10-10T04:06:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22179"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/20290"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3862"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/20290"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3862"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-10-05 23:02
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote attackers to execute arbitrary code.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote attackers to execute arbitrary code."
    }
  ],
  "id": "CVE-2005-3155",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-10-05T23:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17010"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1014999"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15006"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17010"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1014999"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15006"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2006-0504 (GCVE-0-2006-0504)
Vulnerability from cvelistv5
Published
2006-02-01 22:00
Modified
2024-08-07 16:41
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability in MailEnable Enterprise Edition before 1.2 allows remote attackers to cause a denial of service (CPU utilization) by viewing "formatted quoted-printable emails" via webmail.
References
http://www.mailenable.com/enterprisehistory.aspx_refsource_CONFIRM
http://secunia.com/advisories/18716third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/24517vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:41:27.525Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/enterprisehistory.asp"
          },
          {
            "name": "18716",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18716"
          },
          {
            "name": "mailenable-webmail-dos(24517)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24517"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-02-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in MailEnable Enterprise Edition before 1.2 allows remote attackers to cause a denial of service (CPU utilization) by viewing \"formatted quoted-printable emails\" via webmail."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/enterprisehistory.asp"
        },
        {
          "name": "18716",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18716"
        },
        {
          "name": "mailenable-webmail-dos(24517)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24517"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0504",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in MailEnable Enterprise Edition before 1.2 allows remote attackers to cause a denial of service (CPU utilization) by viewing \"formatted quoted-printable emails\" via webmail."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mailenable.com/enterprisehistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/enterprisehistory.asp"
            },
            {
              "name": "18716",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18716"
            },
            {
              "name": "mailenable-webmail-dos(24517)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24517"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0504",
    "datePublished": "2006-02-01T22:00:00",
    "dateReserved": "2006-02-01T00:00:00",
    "dateUpdated": "2024-08-07T16:41:27.525Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-2501 (GCVE-0-2004-2501)
Vulnerability from cvelistv5
Published
2005-10-25 04:00
Modified
2024-08-08 01:29
Severity ?
CWE
  • n/a
Summary
Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote attackers to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection.
References
http://www.osvdb.org/12136vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/13318third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1012327vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/18286vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/11755vdb-entry, x_refsource_BID
http://www.osvdb.org/12135vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/18285vdb-entry, x_refsource_XF
http://www.hat-squad.com/en/000102.htmlx_refsource_MISC
http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.htmlmailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:29:13.868Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "12136",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/12136"
          },
          {
            "name": "13318",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13318"
          },
          {
            "name": "1012327",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1012327"
          },
          {
            "name": "mailenable-imap-code-execution(18286)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18286"
          },
          {
            "name": "11755",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11755"
          },
          {
            "name": "12135",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/12135"
          },
          {
            "name": "mailenable-imap-bo(18285)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18285"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.hat-squad.com/en/000102.html"
          },
          {
            "name": "20041125 Remote buffer overflow in MailEnable IMAP service [Hat-Squad Advisory]",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-11-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote attackers to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "12136",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/12136"
        },
        {
          "name": "13318",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13318"
        },
        {
          "name": "1012327",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1012327"
        },
        {
          "name": "mailenable-imap-code-execution(18286)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18286"
        },
        {
          "name": "11755",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11755"
        },
        {
          "name": "12135",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/12135"
        },
        {
          "name": "mailenable-imap-bo(18285)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18285"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.hat-squad.com/en/000102.html"
        },
        {
          "name": "20041125 Remote buffer overflow in MailEnable IMAP service [Hat-Squad Advisory]",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2501",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote attackers to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "12136",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/12136"
            },
            {
              "name": "13318",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13318"
            },
            {
              "name": "1012327",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1012327"
            },
            {
              "name": "mailenable-imap-code-execution(18286)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18286"
            },
            {
              "name": "11755",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11755"
            },
            {
              "name": "12135",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/12135"
            },
            {
              "name": "mailenable-imap-bo(18285)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18285"
            },
            {
              "name": "http://www.hat-squad.com/en/000102.html",
              "refsource": "MISC",
              "url": "http://www.hat-squad.com/en/000102.html"
            },
            {
              "name": "20041125 Remote buffer overflow in MailEnable IMAP service [Hat-Squad Advisory]",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2501",
    "datePublished": "2005-10-25T04:00:00",
    "dateReserved": "2005-10-25T00:00:00",
    "dateUpdated": "2024-08-08T01:29:13.868Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1792 (GCVE-0-2006-1792)
Vulnerability from cvelistv5
Published
2006-04-15 10:00
Modified
2024-09-17 00:56
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:27:28.764Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/professionalhistory.asp"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/enterprisehistory.asp"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/standardhistory.asp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\".  NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-04-15T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/professionalhistory.asp"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/enterprisehistory.asp"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/standardhistory.asp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1792",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\".  NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mailenable.com/professionalhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/professionalhistory.asp"
            },
            {
              "name": "http://www.mailenable.com/enterprisehistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/enterprisehistory.asp"
            },
            {
              "name": "http://www.mailenable.com/standardhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/standardhistory.asp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1792",
    "datePublished": "2006-04-15T10:00:00Z",
    "dateReserved": "2006-04-15T00:00:00Z",
    "dateUpdated": "2024-09-17T00:56:41.477Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5176 (GCVE-0-2006-5176)
Vulnerability from cvelistv5
Published
2006-10-06 00:00
Modified
2024-08-07 19:41
Severity ?
CWE
  • n/a
Summary
Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via "the signature field of NTLM Type 1 messages".
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:41:05.040Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "22179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22179"
          },
          {
            "name": "mailenable-ntlm-message-bo(29284)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29284"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "20290",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20290"
          },
          {
            "name": "ADV-2006-3862",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3862"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-09-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via \"the signature field of NTLM Type 1 messages\"."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "22179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22179"
        },
        {
          "name": "mailenable-ntlm-message-bo(29284)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29284"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "20290",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20290"
        },
        {
          "name": "ADV-2006-3862",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3862"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5176",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via \"the signature field of NTLM Type 1 messages\"."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "22179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22179"
            },
            {
              "name": "mailenable-ntlm-message-bo(29284)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29284"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "20290",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20290"
            },
            {
              "name": "ADV-2006-3862",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3862"
            },
            {
              "name": "http://labs.musecurity.com/advisories/MU-200609-01.txt",
              "refsource": "MISC",
              "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5176",
    "datePublished": "2006-10-06T00:00:00",
    "dateReserved": "2006-10-05T00:00:00",
    "dateUpdated": "2024-08-07T19:41:05.040Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6605 (GCVE-0-2006-6605)
Vulnerability from cvelistv5
Published
2006-12-19 19:00
Modified
2024-08-07 20:33
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
References
http://securitytracker.com/id?1017395vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/23127third-party-advisory, x_refsource_SECUNIA
http://securityreason.com/securityalert/2053third-party-advisory, x_refsource_SREASON
http://www.mailenable.com/hotfix/x_refsource_CONFIRM
http://www.securityfocus.com/bid/21645vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/454713/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/secunia_research/2006-75/advisory/x_refsource_MISC
http://www.vupen.com/english/advisories/2006/5052vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:33:59.771Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1017395",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017395"
          },
          {
            "name": "23127",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23127"
          },
          {
            "name": "2053",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2053"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "21645",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21645"
          },
          {
            "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-75/advisory/"
          },
          {
            "name": "ADV-2006-5052",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/5052"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
        "shortName": "flexera"
      },
      "references": [
        {
          "name": "1017395",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017395"
        },
        {
          "name": "23127",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23127"
        },
        {
          "name": "2053",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2053"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "21645",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21645"
        },
        {
          "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-75/advisory/"
        },
        {
          "name": "ADV-2006-5052",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/5052"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
          "ID": "CVE-2006-6605",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1017395",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017395"
            },
            {
              "name": "23127",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23127"
            },
            {
              "name": "2053",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2053"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "21645",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21645"
            },
            {
              "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-75/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-75/advisory/"
            },
            {
              "name": "ADV-2006-5052",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/5052"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
    "assignerShortName": "flexera",
    "cveId": "CVE-2006-6605",
    "datePublished": "2006-12-19T19:00:00",
    "dateReserved": "2006-12-17T00:00:00",
    "dateUpdated": "2024-08-07T20:33:59.771Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-3277 (GCVE-0-2006-3277)
Vulnerability from cvelistv5
Published
2006-06-28 22:00
Modified
2024-08-07 18:23
Severity ?
CWE
  • n/a
Summary
The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument.
References
http://www.mailenable.com/hotfix/mesmtpc.zipx_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/27387vdb-entry, x_refsource_XF
http://securitytracker.com/id?1016376vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/2520vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/20790third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/26791vdb-entry, x_refsource_OSVDB
http://www.divisionbyzero.be/?p=174x_refsource_MISC
http://www.securityfocus.com/bid/18630vdb-entry, x_refsource_BID
http://www.divisionbyzero.be/?p=173x_refsource_MISC
http://www.securityfocus.com/archive/1/438374/100/0/threadedmailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:23:20.680Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/mesmtpc.zip"
          },
          {
            "name": "mailenable-smtp-helo-dos(27387)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27387"
          },
          {
            "name": "1016376",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016376"
          },
          {
            "name": "ADV-2006-2520",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2520"
          },
          {
            "name": "20790",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20790"
          },
          {
            "name": "26791",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/26791"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.divisionbyzero.be/?p=174"
          },
          {
            "name": "18630",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18630"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.divisionbyzero.be/?p=173"
          },
          {
            "name": "20060624 Mailenable SMTP Service DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438374/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-06-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/mesmtpc.zip"
        },
        {
          "name": "mailenable-smtp-helo-dos(27387)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27387"
        },
        {
          "name": "1016376",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016376"
        },
        {
          "name": "ADV-2006-2520",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2520"
        },
        {
          "name": "20790",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20790"
        },
        {
          "name": "26791",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/26791"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.divisionbyzero.be/?p=174"
        },
        {
          "name": "18630",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18630"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.divisionbyzero.be/?p=173"
        },
        {
          "name": "20060624 Mailenable SMTP Service DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438374/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-3277",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mailenable.com/hotfix/mesmtpc.zip",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/mesmtpc.zip"
            },
            {
              "name": "mailenable-smtp-helo-dos(27387)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27387"
            },
            {
              "name": "1016376",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016376"
            },
            {
              "name": "ADV-2006-2520",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2520"
            },
            {
              "name": "20790",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20790"
            },
            {
              "name": "26791",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/26791"
            },
            {
              "name": "http://www.divisionbyzero.be/?p=174",
              "refsource": "MISC",
              "url": "http://www.divisionbyzero.be/?p=174"
            },
            {
              "name": "18630",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18630"
            },
            {
              "name": "http://www.divisionbyzero.be/?p=173",
              "refsource": "MISC",
              "url": "http://www.divisionbyzero.be/?p=173"
            },
            {
              "name": "20060624 Mailenable SMTP Service DoS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438374/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-3277",
    "datePublished": "2006-06-28T22:00:00",
    "dateReserved": "2006-06-28T00:00:00",
    "dateUpdated": "2024-08-07T18:23:20.680Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4402 (GCVE-0-2005-4402)
Vulnerability from cvelistv5
Published
2005-12-20 11:00
Modified
2024-08-07 23:46
Severity ?
CWE
  • n/a
Summary
Buffer overflow in MailEnable Professional 1.71 and earlier, and Enterprise 1.1 and earlier, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:46:04.337Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1015378",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/alerts/2005/Dec/1015378.html"
          },
          {
            "name": "ADV-2005-2988",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2988"
          },
          {
            "name": "20051219 Remote Buffer Overflow in Mailenable Enterprise",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=113502692010867\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in MailEnable Professional 1.71 and earlier, and Enterprise 1.1 and earlier, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1015378",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/alerts/2005/Dec/1015378.html"
        },
        {
          "name": "ADV-2005-2988",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2988"
        },
        {
          "name": "20051219 Remote Buffer Overflow in Mailenable Enterprise",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=113502692010867\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4402",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in MailEnable Professional 1.71 and earlier, and Enterprise 1.1 and earlier, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1015378",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/alerts/2005/Dec/1015378.html"
            },
            {
              "name": "ADV-2005-2988",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2988"
            },
            {
              "name": "20051219 Remote Buffer Overflow in Mailenable Enterprise",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=113502692010867\u0026w=2"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "MISC",
              "url": "http://www.mailenable.com/hotfix/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4402",
    "datePublished": "2005-12-20T11:00:00",
    "dateReserved": "2005-12-20T00:00:00",
    "dateUpdated": "2024-08-07T23:46:04.337Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-3813 (GCVE-0-2005-3813)
Vulnerability from cvelistv5
Published
2005-11-26 02:00
Modified
2024-08-07 23:24
Severity ?
CWE
  • n/a
Summary
IMAP service (meimaps.exe) of MailEnable Professional 1.7 and Enterprise 1.1 allows remote authenticated attackers to cause a denial of service (application crash) by using RENAME with a non-existent mailbox, a different vulnerability than CVE-2005-3690.
References
http://securityreason.com/securityalert/205third-party-advisory, x_refsource_SREASON
http://marc.info/?l=full-disclosure&m=113285451031500&w=2mailing-list, x_refsource_FULLDISC
http://www.securityfocus.com/archive/1/417589/30/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/15556vdb-entry, x_refsource_BID
http://securitytracker.com/id?1015268vdb-entry, x_refsource_SECTRACK
http://zur.homelinux.com/Advisories/MailEnableImapDos.txtx_refsource_MISC
http://secunia.com/advisories/17740third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/21109vdb-entry, x_refsource_OSVDB
http://www.vupen.com/english/advisories/2005/2579vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:24:36.281Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "205",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/205"
          },
          {
            "name": "20051124 MailEnable IMAP DOS",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=113285451031500\u0026w=2"
          },
          {
            "name": "20051124 MailEnable IMAP DOS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/417589/30/0/threaded"
          },
          {
            "name": "15556",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15556"
          },
          {
            "name": "1015268",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015268"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://zur.homelinux.com/Advisories/MailEnableImapDos.txt"
          },
          {
            "name": "17740",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17740"
          },
          {
            "name": "21109",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21109"
          },
          {
            "name": "ADV-2005-2579",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2579"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-11-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IMAP service (meimaps.exe) of MailEnable Professional 1.7 and Enterprise 1.1 allows remote authenticated attackers to cause a denial of service (application crash) by using RENAME with a non-existent mailbox, a different vulnerability than CVE-2005-3690."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "205",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/205"
        },
        {
          "name": "20051124 MailEnable IMAP DOS",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=113285451031500\u0026w=2"
        },
        {
          "name": "20051124 MailEnable IMAP DOS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/417589/30/0/threaded"
        },
        {
          "name": "15556",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15556"
        },
        {
          "name": "1015268",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015268"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://zur.homelinux.com/Advisories/MailEnableImapDos.txt"
        },
        {
          "name": "17740",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17740"
        },
        {
          "name": "21109",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21109"
        },
        {
          "name": "ADV-2005-2579",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2579"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3813",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IMAP service (meimaps.exe) of MailEnable Professional 1.7 and Enterprise 1.1 allows remote authenticated attackers to cause a denial of service (application crash) by using RENAME with a non-existent mailbox, a different vulnerability than CVE-2005-3690."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "205",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/205"
            },
            {
              "name": "20051124 MailEnable IMAP DOS",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=113285451031500\u0026w=2"
            },
            {
              "name": "20051124 MailEnable IMAP DOS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/417589/30/0/threaded"
            },
            {
              "name": "15556",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15556"
            },
            {
              "name": "1015268",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015268"
            },
            {
              "name": "http://zur.homelinux.com/Advisories/MailEnableImapDos.txt",
              "refsource": "MISC",
              "url": "http://zur.homelinux.com/Advisories/MailEnableImapDos.txt"
            },
            {
              "name": "17740",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17740"
            },
            {
              "name": "21109",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21109"
            },
            {
              "name": "ADV-2005-2579",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2579"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3813",
    "datePublished": "2005-11-26T02:00:00",
    "dateReserved": "2005-11-26T00:00:00",
    "dateUpdated": "2024-08-07T23:24:36.281Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5177 (GCVE-0-2006-5177)
Vulnerability from cvelistv5
Published
2006-10-06 00:00
Modified
2024-08-07 19:41
Severity ?
CWE
  • n/a
Summary
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:41:05.016Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "mailenable-base64-message-code-execution(29287)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287"
          },
          {
            "name": "22179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22179"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "mailenable-base64-ntml-message-dos(29286)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286"
          },
          {
            "name": "20290",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20290"
          },
          {
            "name": "ADV-2006-3862",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3862"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-09-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "mailenable-base64-message-code-execution(29287)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287"
        },
        {
          "name": "22179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22179"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "mailenable-base64-ntml-message-dos(29286)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286"
        },
        {
          "name": "20290",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20290"
        },
        {
          "name": "ADV-2006-3862",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3862"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5177",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "mailenable-base64-message-code-execution(29287)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287"
            },
            {
              "name": "22179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22179"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "mailenable-base64-ntml-message-dos(29286)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286"
            },
            {
              "name": "20290",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20290"
            },
            {
              "name": "ADV-2006-3862",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3862"
            },
            {
              "name": "http://labs.musecurity.com/advisories/MU-200609-01.txt",
              "refsource": "MISC",
              "url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5177",
    "datePublished": "2006-10-06T00:00:00",
    "dateReserved": "2006-10-05T00:00:00",
    "dateUpdated": "2024-08-07T19:41:05.016Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6484 (GCVE-0-2006-6484)
Vulnerability from cvelistv5
Published
2006-12-12 20:00
Modified
2024-08-07 20:26
Severity ?
CWE
  • n/a
Summary
The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information.
References
http://www.securityfocus.com/bid/21493vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/30797vdb-entry, x_refsource_XF
http://secunia.com/advisories/23267third-party-advisory, x_refsource_SECUNIA
http://www.mailenable.com/hotfix/x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:26:46.583Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "21493",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21493"
          },
          {
            "name": "mailenable-null-imap-dos(30797)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797"
          },
          {
            "name": "23267",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23267"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423.  NOTE: some details were obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "21493",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21493"
        },
        {
          "name": "mailenable-null-imap-dos(30797)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797"
        },
        {
          "name": "23267",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23267"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6484",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423.  NOTE: some details were obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "21493",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21493"
            },
            {
              "name": "mailenable-null-imap-dos(30797)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797"
            },
            {
              "name": "23267",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23267"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6484",
    "datePublished": "2006-12-12T20:00:00",
    "dateReserved": "2006-12-12T00:00:00",
    "dateUpdated": "2024-08-07T20:26:46.583Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6290 (GCVE-0-2006-6290)
Vulnerability from cvelistv5
Published
2006-12-05 11:00
Modified
2024-08-07 20:19
Severity ?
CWE
  • n/a
Summary
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.
References
http://securitytracker.com/id?1017276vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/4778vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/23080third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/21362vdb-entry, x_refsource_BID
http://securitytracker.com/id?1017319vdb-entry, x_refsource_SECTRACK
http://www.mailenable.com/hotfix/x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/4673vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/453118/100/100/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/23047third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/30614vdb-entry, x_refsource_XF
http://secunia.com/secunia_research/2006-71/advisory/x_refsource_MISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:19:35.175Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1017276",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017276"
          },
          {
            "name": "ADV-2006-4778",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4778"
          },
          {
            "name": "23080",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23080"
          },
          {
            "name": "21362",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21362"
          },
          {
            "name": "1017319",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017319"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "ADV-2006-4673",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4673"
          },
          {
            "name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
          },
          {
            "name": "23047",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23047"
          },
          {
            "name": "mailenable-meimaps-bo(30614)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-71/advisory/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1017276",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017276"
        },
        {
          "name": "ADV-2006-4778",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4778"
        },
        {
          "name": "23080",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23080"
        },
        {
          "name": "21362",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21362"
        },
        {
          "name": "1017319",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017319"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "ADV-2006-4673",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4673"
        },
        {
          "name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
        },
        {
          "name": "23047",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23047"
        },
        {
          "name": "mailenable-meimaps-bo(30614)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-71/advisory/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6290",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1017276",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017276"
            },
            {
              "name": "ADV-2006-4778",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4778"
            },
            {
              "name": "23080",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23080"
            },
            {
              "name": "21362",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21362"
            },
            {
              "name": "1017319",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017319"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "ADV-2006-4673",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4673"
            },
            {
              "name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
            },
            {
              "name": "23047",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23047"
            },
            {
              "name": "mailenable-meimaps-bo(30614)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-71/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-71/advisory/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6290",
    "datePublished": "2006-12-05T11:00:00",
    "dateReserved": "2006-12-05T00:00:00",
    "dateUpdated": "2024-08-07T20:19:35.175Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1338 (GCVE-0-2006-1338)
Vulnerability from cvelistv5
Published
2006-03-21 02:00
Modified
2024-08-07 17:12
Severity ?
CWE
  • n/a
Summary
Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving "incorrectly encoded quoted-printable emails".
References
http://www.mailenable.com/professionalhistory.aspx_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/25315vdb-entry, x_refsource_XF
http://www.mailenable.com/enterprisehistory.aspx_refsource_CONFIRM
http://secunia.com/advisories/19288third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/24014vdb-entry, x_refsource_OSVDB
http://www.vupen.com/english/advisories/2006/1006vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/17161vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:12:20.561Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/professionalhistory.asp"
          },
          {
            "name": "mailenable-webmail-component-dos(25315)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25315"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/enterprisehistory.asp"
          },
          {
            "name": "19288",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19288"
          },
          {
            "name": "24014",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/24014"
          },
          {
            "name": "ADV-2006-1006",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1006"
          },
          {
            "name": "17161",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17161"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving \"incorrectly encoded quoted-printable emails\"."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/professionalhistory.asp"
        },
        {
          "name": "mailenable-webmail-component-dos(25315)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25315"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/enterprisehistory.asp"
        },
        {
          "name": "19288",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19288"
        },
        {
          "name": "24014",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/24014"
        },
        {
          "name": "ADV-2006-1006",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1006"
        },
        {
          "name": "17161",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17161"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1338",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving \"incorrectly encoded quoted-printable emails\"."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mailenable.com/professionalhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/professionalhistory.asp"
            },
            {
              "name": "mailenable-webmail-component-dos(25315)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25315"
            },
            {
              "name": "http://www.mailenable.com/enterprisehistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/enterprisehistory.asp"
            },
            {
              "name": "19288",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19288"
            },
            {
              "name": "24014",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/24014"
            },
            {
              "name": "ADV-2006-1006",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1006"
            },
            {
              "name": "17161",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17161"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1338",
    "datePublished": "2006-03-21T02:00:00",
    "dateReserved": "2006-03-20T00:00:00",
    "dateUpdated": "2024-08-07T17:12:20.561Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-3691 (GCVE-0-2005-3691)
Vulnerability from cvelistv5
Published
2005-11-19 01:00
Modified
2024-08-07 23:17
Severity ?
CWE
  • n/a
Summary
Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail directories via the mailbox name argument of the (1) create or (2) rename commands.
References
http://secunia.com/advisories/17633third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2005/2484vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/15494vdb-entry, x_refsource_BID
http://secunia.com/secunia_research/2005-59/advisory/x_refsource_MISC
http://www.mailenable.com/hotfix/x_refsource_CONFIRM
http://securitytracker.com/id?1015239vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:17:23.630Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17633",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17633"
          },
          {
            "name": "ADV-2005-2484",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2484"
          },
          {
            "name": "15494",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15494"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-59/advisory/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "1015239",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015239"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-11-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail directories via the mailbox name argument of the (1) create or (2) rename commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-24T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17633",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17633"
        },
        {
          "name": "ADV-2005-2484",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2484"
        },
        {
          "name": "15494",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15494"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-59/advisory/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "1015239",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015239"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3691",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail directories via the mailbox name argument of the (1) create or (2) rename commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17633",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17633"
            },
            {
              "name": "ADV-2005-2484",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2484"
            },
            {
              "name": "15494",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15494"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-59/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-59/advisory/"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "1015239",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015239"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3691",
    "datePublished": "2005-11-19T01:00:00",
    "dateReserved": "2005-11-19T00:00:00",
    "dateUpdated": "2024-08-07T23:17:23.630Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-3993 (GCVE-0-2005-3993)
Vulnerability from cvelistv5
Published
2005-12-05 00:00
Modified
2024-08-07 23:31
Severity ?
CWE
  • n/a
Summary
Multiple unspecified vulnerabilities in MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allow attackers to cause a denial of service (crash) via invalid IMAP commands.
References
http://secunia.com/advisories/17820third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/21388vdb-entry, x_refsource_OSVDB
http://www.mailenable.com/hotfix/x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2005/2704vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:31:48.929Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17820",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17820"
          },
          {
            "name": "21388",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/21388"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "ADV-2005-2704",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2704"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allow attackers to cause a denial of service (crash) via invalid IMAP commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17820",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17820"
        },
        {
          "name": "21388",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/21388"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "ADV-2005-2704",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2704"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3993",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allow attackers to cause a denial of service (crash) via invalid IMAP commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17820",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17820"
            },
            {
              "name": "21388",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/21388"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "ADV-2005-2704",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2704"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3993",
    "datePublished": "2005-12-05T00:00:00",
    "dateReserved": "2005-12-04T00:00:00",
    "dateUpdated": "2024-08-07T23:31:48.929Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-1014 (GCVE-0-2005-1014)
Vulnerability from cvelistv5
Published
2005-04-08 04:00
Modified
2024-08-07 21:35
Severity ?
CWE
  • n/a
Summary
Buffer overflow in the IMAP service for MailEnable Enterprise 1.04 and earlier and Professional 1.54 allows remote attackers to execute arbitrary code via a long AUTHENTICATE command.
References
http://securitytracker.com/id?1013637vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/19947vdb-entry, x_refsource_XF
http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033123.htmlmailing-list, x_refsource_FULLDISC
http://www.mailenable.com/hotfix/x_refsource_CONFIRM
http://www.securityfocus.com/bid/12995vdb-entry, x_refsource_BID
http://secunia.com/advisories/14812third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:35:59.615Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1013637",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1013637"
          },
          {
            "name": "mailenable-imap-dos(19947)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19947"
          },
          {
            "name": "20050405 MailEnable Imapd remote BoF + Exploit [x0n3-h4ck]",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033123.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "12995",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12995"
          },
          {
            "name": "14812",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/14812"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-04-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the IMAP service for MailEnable Enterprise 1.04 and earlier and Professional 1.54 allows remote attackers to execute arbitrary code via a long AUTHENTICATE command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1013637",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1013637"
        },
        {
          "name": "mailenable-imap-dos(19947)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19947"
        },
        {
          "name": "20050405 MailEnable Imapd remote BoF + Exploit [x0n3-h4ck]",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033123.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "12995",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12995"
        },
        {
          "name": "14812",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/14812"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-1014",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the IMAP service for MailEnable Enterprise 1.04 and earlier and Professional 1.54 allows remote attackers to execute arbitrary code via a long AUTHENTICATE command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1013637",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1013637"
            },
            {
              "name": "mailenable-imap-dos(19947)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19947"
            },
            {
              "name": "20050405 MailEnable Imapd remote BoF + Exploit [x0n3-h4ck]",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033123.html"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "12995",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12995"
            },
            {
              "name": "14812",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/14812"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-1014",
    "datePublished": "2005-04-08T04:00:00",
    "dateReserved": "2005-04-08T00:00:00",
    "dateUpdated": "2024-08-07T21:35:59.615Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-1013 (GCVE-0-2005-1013)
Vulnerability from cvelistv5
Published
2005-04-08 04:00
Modified
2024-08-07 21:35
Severity ?
CWE
  • n/a
Summary
The SMTP service in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to cause a denial of service (server crash) via an EHLO command with a Unicode string.
References
http://www.securityfocus.com/bid/12994vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/19948vdb-entry, x_refsource_XF
http://securitytracker.com/id?1013637vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/19973vdb-entry, x_refsource_XF
http://www.osvdb.org/15232vdb-entry, x_refsource_OSVDB
http://marc.info/?l=bugtraq&m=111273637518494&w=2mailing-list, x_refsource_BUGTRAQ
http://www.mailenable.com/hotfix/x_refsource_CONFIRM
http://www.securiteam.com/windowsntfocus/5HP031PFFG.htmlx_refsource_MISC
http://secunia.com/advisories/14812third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:35:59.815Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "12994",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12994"
          },
          {
            "name": "mailenable-smtp-dos(19948)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19948"
          },
          {
            "name": "1013637",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1013637"
          },
          {
            "name": "mailenable-ehlo-dos(19973)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19973"
          },
          {
            "name": "15232",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/15232"
          },
          {
            "name": "20050405 MailEnable Smtpd remote Dos [x0n3-h4ck]",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=111273637518494\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.securiteam.com/windowsntfocus/5HP031PFFG.html"
          },
          {
            "name": "14812",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/14812"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-04-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The SMTP service in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to cause a denial of service (server crash) via an EHLO command with a Unicode string."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "12994",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12994"
        },
        {
          "name": "mailenable-smtp-dos(19948)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19948"
        },
        {
          "name": "1013637",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1013637"
        },
        {
          "name": "mailenable-ehlo-dos(19973)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19973"
        },
        {
          "name": "15232",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/15232"
        },
        {
          "name": "20050405 MailEnable Smtpd remote Dos [x0n3-h4ck]",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=111273637518494\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.securiteam.com/windowsntfocus/5HP031PFFG.html"
        },
        {
          "name": "14812",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/14812"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-1013",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SMTP service in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to cause a denial of service (server crash) via an EHLO command with a Unicode string."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "12994",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12994"
            },
            {
              "name": "mailenable-smtp-dos(19948)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19948"
            },
            {
              "name": "1013637",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1013637"
            },
            {
              "name": "mailenable-ehlo-dos(19973)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19973"
            },
            {
              "name": "15232",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/15232"
            },
            {
              "name": "20050405 MailEnable Smtpd remote Dos [x0n3-h4ck]",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=111273637518494\u0026w=2"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "http://www.securiteam.com/windowsntfocus/5HP031PFFG.html",
              "refsource": "MISC",
              "url": "http://www.securiteam.com/windowsntfocus/5HP031PFFG.html"
            },
            {
              "name": "14812",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/14812"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-1013",
    "datePublished": "2005-04-08T04:00:00",
    "dateReserved": "2005-04-08T00:00:00",
    "dateUpdated": "2024-08-07T21:35:59.815Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-1348 (GCVE-0-2005-1348)
Vulnerability from cvelistv5
Published
2005-04-28 04:00
Modified
2024-08-07 21:44
Severity ?
CWE
  • n/a
Summary
Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header.
References
http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.plx_refsource_MISC
http://www.osvdb.org/15737vdb-entry, x_refsource_OSVDB
http://securitytracker.com/id?1013786vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=111445834220015&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:44:06.474Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl"
          },
          {
            "name": "15737",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/15737"
          },
          {
            "name": "1013786",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1013786"
          },
          {
            "name": "20050424 MailEnable HTTPS Buffer Overflow [x0n3-h4ck]",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=111445834220015\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-04-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl"
        },
        {
          "name": "15737",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/15737"
        },
        {
          "name": "1013786",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1013786"
        },
        {
          "name": "20050424 MailEnable HTTPS Buffer Overflow [x0n3-h4ck]",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=111445834220015\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-1348",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl",
              "refsource": "MISC",
              "url": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl"
            },
            {
              "name": "15737",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/15737"
            },
            {
              "name": "1013786",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1013786"
            },
            {
              "name": "20050424 MailEnable HTTPS Buffer Overflow [x0n3-h4ck]",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=111445834220015\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-1348",
    "datePublished": "2005-04-28T04:00:00",
    "dateReserved": "2005-04-28T00:00:00",
    "dateUpdated": "2024-08-07T21:44:06.474Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6423 (GCVE-0-2006-6423)
Vulnerability from cvelistv5
Published
2006-12-12 02:00
Modified
2024-08-07 20:26
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix.
References
http://secunia.com/secunia_research/2006-73/advisory/x_refsource_MISC
http://securityreason.com/securityalert/2022third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/bid/21492vdb-entry, x_refsource_BID
http://www.mailenable.com/hotfix/x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/30796vdb-entry, x_refsource_XF
http://secunia.com/advisories/23201third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/454075/100/0/threadedmailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:26:46.508Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-73/advisory/"
          },
          {
            "name": "2022",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2022"
          },
          {
            "name": "21492",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21492"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "mailenable-bounds-imap-bo(30796)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796"
          },
          {
            "name": "23201",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23201"
          },
          {
            "name": "20061211 Secunia Research: MailEnable IMAP Service Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
        "shortName": "flexera"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-73/advisory/"
        },
        {
          "name": "2022",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2022"
        },
        {
          "name": "21492",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21492"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "mailenable-bounds-imap-bo(30796)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796"
        },
        {
          "name": "23201",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23201"
        },
        {
          "name": "20061211 Secunia Research: MailEnable IMAP Service Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
          "ID": "CVE-2006-6423",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://secunia.com/secunia_research/2006-73/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-73/advisory/"
            },
            {
              "name": "2022",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2022"
            },
            {
              "name": "21492",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21492"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "mailenable-bounds-imap-bo(30796)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796"
            },
            {
              "name": "23201",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23201"
            },
            {
              "name": "20061211 Secunia Research: MailEnable IMAP Service Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
    "assignerShortName": "flexera",
    "cveId": "CVE-2006-6423",
    "datePublished": "2006-12-12T02:00:00",
    "dateReserved": "2006-12-09T00:00:00",
    "dateUpdated": "2024-08-07T20:26:46.508Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4457 (GCVE-0-2005-4457)
Vulnerability from cvelistv5
Published
2005-12-21 11:00
Modified
2024-08-07 23:46
Severity ?
CWE
  • n/a
Summary
MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several "..." (triple dot) sequences in a UID FETCH command.
References
http://secunia.com/advisories/18134third-party-advisory, x_refsource_SECUNIA
http://seclists.org/lists/fulldisclosure/2005/Dec/1036.htmlmailing-list, x_refsource_FULLDISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:46:05.167Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18134",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18134"
          },
          {
            "name": "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several \"...\" (triple dot) sequences in a UID FETCH command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-02-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18134",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18134"
        },
        {
          "name": "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4457",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several \"...\" (triple dot) sequences in a UID FETCH command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18134",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18134"
            },
            {
              "name": "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4457",
    "datePublished": "2005-12-21T11:00:00",
    "dateReserved": "2005-12-21T00:00:00",
    "dateUpdated": "2024-08-07T23:46:05.167Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1276 (GCVE-0-2008-1276)
Vulnerability from cvelistv5
Published
2008-03-10 23:00
Modified
2024-08-07 08:17
Severity ?
CWE
  • n/a
Summary
Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands.
References
http://secunia.com/advisories/29277third-party-advisory, x_refsource_SECUNIA
http://aluigi.altervista.org/adv/maildisable-adv.txtx_refsource_MISC
https://www.exploit-db.com/exploits/5249exploit, x_refsource_EXPLOIT-DB
http://www.vupen.com/english/advisories/2008/0799/referencesvdb-entry, x_refsource_VUPEN
http://securityreason.com/securityalert/3724third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/archive/1/489270/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.securitytracker.com/id?1019565vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/28145vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/41058vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:33.548Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "29277",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29277"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
          },
          {
            "name": "5249",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5249"
          },
          {
            "name": "ADV-2008-0799",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0799/references"
          },
          {
            "name": "3724",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3724"
          },
          {
            "name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
          },
          {
            "name": "1019565",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019565"
          },
          {
            "name": "28145",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28145"
          },
          {
            "name": "mailenable-imapservice-bo(41058)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "29277",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29277"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
        },
        {
          "name": "5249",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5249"
        },
        {
          "name": "ADV-2008-0799",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0799/references"
        },
        {
          "name": "3724",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3724"
        },
        {
          "name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
        },
        {
          "name": "1019565",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019565"
        },
        {
          "name": "28145",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28145"
        },
        {
          "name": "mailenable-imapservice-bo(41058)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1276",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "29277",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29277"
            },
            {
              "name": "http://aluigi.altervista.org/adv/maildisable-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
            },
            {
              "name": "5249",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5249"
            },
            {
              "name": "ADV-2008-0799",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0799/references"
            },
            {
              "name": "3724",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3724"
            },
            {
              "name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
            },
            {
              "name": "1019565",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019565"
            },
            {
              "name": "28145",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28145"
            },
            {
              "name": "mailenable-imapservice-bo(41058)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1276",
    "datePublished": "2008-03-10T23:00:00",
    "dateReserved": "2008-03-10T00:00:00",
    "dateUpdated": "2024-08-07T08:17:33.548Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6997 (GCVE-0-2006-6997)
Vulnerability from cvelistv5
Published
2007-02-12 11:00
Modified
2024-09-17 02:33
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:50:05.730Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/professionalhistory.asp"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/enterprisehistory.asp"
          },
          {
            "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/standardhistory.asp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors.  NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-02-12T11:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/professionalhistory.asp"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/enterprisehistory.asp"
        },
        {
          "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/standardhistory.asp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6997",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors.  NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mailenable.com/professionalhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/professionalhistory.asp"
            },
            {
              "name": "http://www.mailenable.com/enterprisehistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/enterprisehistory.asp"
            },
            {
              "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
            },
            {
              "name": "http://www.mailenable.com/standardhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/standardhistory.asp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6997",
    "datePublished": "2007-02-12T11:00:00Z",
    "dateReserved": "2007-02-12T00:00:00Z",
    "dateUpdated": "2024-09-17T02:33:03.597Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1277 (GCVE-0-2008-1277)
Vulnerability from cvelistv5
Published
2008-03-10 23:00
Modified
2024-08-07 08:17
Severity ?
CWE
  • n/a
Summary
The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference.
References
http://secunia.com/advisories/29277third-party-advisory, x_refsource_SECUNIA
http://aluigi.altervista.org/adv/maildisable-adv.txtx_refsource_MISC
http://www.vupen.com/english/advisories/2008/0799/referencesvdb-entry, x_refsource_VUPEN
http://securityreason.com/securityalert/3724third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/archive/1/489270/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.securitytracker.com/id?1019565vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/28145vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/41059vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.437Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "29277",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29277"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
          },
          {
            "name": "ADV-2008-0799",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0799/references"
          },
          {
            "name": "3724",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3724"
          },
          {
            "name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
          },
          {
            "name": "1019565",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019565"
          },
          {
            "name": "28145",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28145"
          },
          {
            "name": "mailenable-imapservice-dos(41059)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "29277",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29277"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
        },
        {
          "name": "ADV-2008-0799",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0799/references"
        },
        {
          "name": "3724",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3724"
        },
        {
          "name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
        },
        {
          "name": "1019565",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019565"
        },
        {
          "name": "28145",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28145"
        },
        {
          "name": "mailenable-imapservice-dos(41059)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1277",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "29277",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29277"
            },
            {
              "name": "http://aluigi.altervista.org/adv/maildisable-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
            },
            {
              "name": "ADV-2008-0799",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0799/references"
            },
            {
              "name": "3724",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3724"
            },
            {
              "name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
            },
            {
              "name": "1019565",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019565"
            },
            {
              "name": "28145",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28145"
            },
            {
              "name": "mailenable-imapservice-dos(41059)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1277",
    "datePublished": "2008-03-10T23:00:00",
    "dateReserved": "2008-03-10T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.437Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1301 (GCVE-0-2007-1301)
Vulnerability from cvelistv5
Published
2007-03-07 00:00
Modified
2024-08-07 12:50
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423.
References
http://www.vupen.com/english/advisories/2007/0811vdb-entry, x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/32801vdb-entry, x_refsource_XF
http://secunia.com/advisories/24361third-party-advisory, x_refsource_SECUNIA
http://www.mailenable.com/hotfix/x_refsource_CONFIRM
http://www.securityfocus.com/bid/22792vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1017739vdb-entry, x_refsource_SECTRACK
https://www.exploit-db.com/exploits/3397exploit, x_refsource_EXPLOIT-DB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:50:35.259Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2007-0811",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0811"
          },
          {
            "name": "mailenable-append-bo(32801)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801"
          },
          {
            "name": "24361",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24361"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "22792",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22792"
          },
          {
            "name": "1017739",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017739"
          },
          {
            "name": "3397",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/3397"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command.  NOTE: this is probably different than CVE-2006-6423."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2007-0811",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0811"
        },
        {
          "name": "mailenable-append-bo(32801)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801"
        },
        {
          "name": "24361",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24361"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "22792",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22792"
        },
        {
          "name": "1017739",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017739"
        },
        {
          "name": "3397",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/3397"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1301",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command.  NOTE: this is probably different than CVE-2006-6423."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2007-0811",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0811"
            },
            {
              "name": "mailenable-append-bo(32801)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801"
            },
            {
              "name": "24361",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24361"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "22792",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22792"
            },
            {
              "name": "1017739",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017739"
            },
            {
              "name": "3397",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/3397"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1301",
    "datePublished": "2007-03-07T00:00:00",
    "dateReserved": "2007-03-06T00:00:00",
    "dateUpdated": "2024-08-07T12:50:35.259Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1275 (GCVE-0-2008-1275)
Vulnerability from cvelistv5
Published
2008-03-10 23:00
Modified
2024-08-07 08:17
Severity ?
CWE
  • n/a
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.
References
https://www.exploit-db.com/exploits/5235exploit, x_refsource_EXPLOIT-DB
https://exchange.xforce.ibmcloud.com/vulnerabilities/41083vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/28154vdb-entry, x_refsource_BID
http://www.mailenable.com/hotfix/x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/0800/referencesvdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/29300third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.526Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "5235",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5235"
          },
          {
            "name": "mailenable-expn-vrfy-dos(41083)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
          },
          {
            "name": "28154",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28154"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "ADV-2008-0800",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0800/references"
          },
          {
            "name": "29300",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29300"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "5235",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5235"
        },
        {
          "name": "mailenable-expn-vrfy-dos(41083)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
        },
        {
          "name": "28154",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28154"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "ADV-2008-0800",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0800/references"
        },
        {
          "name": "29300",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29300"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1275",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "5235",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5235"
            },
            {
              "name": "mailenable-expn-vrfy-dos(41083)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
            },
            {
              "name": "28154",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28154"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "ADV-2008-0800",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0800/references"
            },
            {
              "name": "29300",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29300"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1275",
    "datePublished": "2008-03-10T23:00:00",
    "dateReserved": "2008-03-10T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.526Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-3155 (GCVE-0-2005-3155)
Vulnerability from cvelistv5
Published
2005-10-05 04:00
Modified
2024-08-07 23:01
Severity ?
CWE
  • n/a
Summary
Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote attackers to execute arbitrary code.
References
http://www.securityfocus.com/bid/15006vdb-entry, x_refsource_BID
http://securitytracker.com/id?1014999vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/17010third-party-advisory, x_refsource_SECUNIA
http://www.mailenable.com/hotfix/x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:01:58.599Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "15006",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15006"
          },
          {
            "name": "1014999",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014999"
          },
          {
            "name": "17010",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17010"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-10-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote attackers to execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-24T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "15006",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15006"
        },
        {
          "name": "1014999",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014999"
        },
        {
          "name": "17010",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17010"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3155",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote attackers to execute arbitrary code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "15006",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15006"
            },
            {
              "name": "1014999",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014999"
            },
            {
              "name": "17010",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17010"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3155",
    "datePublished": "2005-10-05T04:00:00",
    "dateReserved": "2005-10-05T00:00:00",
    "dateUpdated": "2024-08-07T23:01:58.599Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4456 (GCVE-0-2005-4456)
Vulnerability from cvelistv5
Published
2005-12-21 11:00
Modified
2024-08-07 23:46
Severity ?
CWE
  • n/a
Summary
Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands. NOTE: it is possible that these are alternate vectors for the issue described in CVE-2005-4402.
References
http://secunia.com/advisories/18134third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/15985vdb-entry, x_refsource_BID
http://seclists.org/lists/fulldisclosure/2005/Dec/1036.htmlmailing-list, x_refsource_FULLDISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:46:05.184Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18134",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18134"
          },
          {
            "name": "15985",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15985"
          },
          {
            "name": "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands.  NOTE: it is possible that these are alternate vectors for the issue described in CVE-2005-4402."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-02-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18134",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18134"
        },
        {
          "name": "15985",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15985"
        },
        {
          "name": "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4456",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands.  NOTE: it is possible that these are alternate vectors for the issue described in CVE-2005-4402."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18134",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18134"
            },
            {
              "name": "15985",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15985"
            },
            {
              "name": "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4456",
    "datePublished": "2005-12-21T11:00:00",
    "dateReserved": "2005-12-21T00:00:00",
    "dateUpdated": "2024-08-07T23:46:05.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4616 (GCVE-0-2006-4616)
Vulnerability from cvelistv5
Published
2006-09-07 00:00
Modified
2024-08-07 19:14
Severity ?
CWE
  • n/a
Summary
SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.
References
http://www.vupen.com/english/advisories/2006/3669vdb-entry, x_refsource_VUPEN
http://securitytracker.com/id?1016792vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/28910vdb-entry, x_refsource_XF
http://www.mailenable.com/hotfix/x_refsource_CONFIRM
http://www.securityfocus.com/bid/20091vdb-entry, x_refsource_BID
http://www.mailenable.com/hotfix/MESMTPC.ZIPx_refsource_CONFIRM
http://secunia.com/advisories/21998third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:14:47.795Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-3669",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3669"
          },
          {
            "name": "1016792",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016792"
          },
          {
            "name": "mailenable-spf-dos(28910)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "20091",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20091"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
          },
          {
            "name": "21998",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21998"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-09-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-3669",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3669"
        },
        {
          "name": "1016792",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016792"
        },
        {
          "name": "mailenable-spf-dos(28910)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "20091",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20091"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
        },
        {
          "name": "21998",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21998"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4616",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-3669",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3669"
            },
            {
              "name": "1016792",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016792"
            },
            {
              "name": "mailenable-spf-dos(28910)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "20091",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20091"
            },
            {
              "name": "http://www.mailenable.com/hotfix/MESMTPC.ZIP",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
            },
            {
              "name": "21998",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21998"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4616",
    "datePublished": "2006-09-07T00:00:00",
    "dateReserved": "2006-09-06T00:00:00",
    "dateUpdated": "2024-08-07T19:14:47.795Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-1781 (GCVE-0-2005-1781)
Vulnerability from cvelistv5
Published
2005-05-31 04:00
Modified
2024-09-17 01:00
Severity ?
CWE
  • n/a
Summary
Unknown vulnerability in SMTP authentication for MailEnable allows remote attackers to cause a denial of service (crash).
References
http://secunia.com/advisories/15487third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:59:24.101Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "15487",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15487"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unknown vulnerability in SMTP authentication for MailEnable allows remote attackers to cause a denial of service (crash)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-05-31T04:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "15487",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15487"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-1781",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unknown vulnerability in SMTP authentication for MailEnable allows remote attackers to cause a denial of service (crash)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "15487",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15487"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-1781",
    "datePublished": "2005-05-31T04:00:00Z",
    "dateReserved": "2005-05-31T00:00:00Z",
    "dateUpdated": "2024-09-17T01:00:32.596Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-3690 (GCVE-0-2005-3690)
Vulnerability from cvelistv5
Published
2005-11-19 01:00
Modified
2024-08-07 23:17
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (4) rename, (5) subscribe, or (6) unsubscribe commands.
References
http://secunia.com/advisories/17633third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2005/2484vdb-entry, x_refsource_VUPEN
http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0581.htmlmailing-list, x_refsource_FULLDISC
http://secunia.com/secunia_research/2005-59/advisory/x_refsource_MISC
http://www.mailenable.com/hotfix/x_refsource_CONFIRM
http://securitytracker.com/id?1015239vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/23110vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/15492vdb-entry, x_refsource_BID
http://www.osvdb.org/20929vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:17:23.683Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17633",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17633"
          },
          {
            "name": "ADV-2005-2484",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2484"
          },
          {
            "name": "20051118 Secunia Research: MailEnable Buffer Overflow and Directory Traversal Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0581.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-59/advisory/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "1015239",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015239"
          },
          {
            "name": "mailenable-imap-mailbox-bo(23110)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23110"
          },
          {
            "name": "15492",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15492"
          },
          {
            "name": "20929",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/20929"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-11-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (4) rename, (5) subscribe, or (6) unsubscribe commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17633",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17633"
        },
        {
          "name": "ADV-2005-2484",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2484"
        },
        {
          "name": "20051118 Secunia Research: MailEnable Buffer Overflow and Directory Traversal Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0581.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-59/advisory/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "1015239",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015239"
        },
        {
          "name": "mailenable-imap-mailbox-bo(23110)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23110"
        },
        {
          "name": "15492",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15492"
        },
        {
          "name": "20929",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/20929"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3690",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (4) rename, (5) subscribe, or (6) unsubscribe commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17633",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17633"
            },
            {
              "name": "ADV-2005-2484",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2484"
            },
            {
              "name": "20051118 Secunia Research: MailEnable Buffer Overflow and Directory Traversal Vulnerabilities",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0581.html"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-59/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-59/advisory/"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "1015239",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015239"
            },
            {
              "name": "mailenable-imap-mailbox-bo(23110)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23110"
            },
            {
              "name": "15492",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15492"
            },
            {
              "name": "20929",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/20929"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3690",
    "datePublished": "2005-11-19T01:00:00",
    "dateReserved": "2005-11-19T00:00:00",
    "dateUpdated": "2024-08-07T23:17:23.683Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-2194 (GCVE-0-2004-2194)
Vulnerability from cvelistv5
Published
2005-07-10 04:00
Modified
2024-08-08 01:15
Severity ?
CWE
  • n/a
Summary
MailEnable Professional Edition before 1.53 and Enterprise Edition before 1.02 allows remote attackers to cause a denial of service (crash) via malformed (1) SMTP or (2) IMAP commands.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:15:01.748Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "11418",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11418"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/professionalhistory.asp"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/enterprisehistory.asp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-10-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MailEnable Professional Edition before 1.53 and Enterprise Edition before 1.02 allows remote attackers to cause a denial of service (crash) via malformed (1) SMTP or (2) IMAP commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-15T16:40:16",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "11418",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11418"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/professionalhistory.asp"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/enterprisehistory.asp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2194",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MailEnable Professional Edition before 1.53 and Enterprise Edition before 1.02 allows remote attackers to cause a denial of service (crash) via malformed (1) SMTP or (2) IMAP commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "11418",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11418"
            },
            {
              "name": "http://www.mailenable.com/professionalhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/professionalhistory.asp"
            },
            {
              "name": "http://www.mailenable.com/enterprisehistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/enterprisehistory.asp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2194",
    "datePublished": "2005-07-10T04:00:00",
    "dateReserved": "2005-07-11T00:00:00",
    "dateUpdated": "2024-08-08T01:15:01.748Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}