Vulnerabilites related to mailenable - mailenable_standard
CVE-2006-6997 (GCVE-0-2006-6997)
Vulnerability from cvelistv5
Published
2007-02-12 11:00
Modified
2024-09-17 02:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.
References
▼ | URL | Tags |
---|---|---|
http://www.mailenable.com/professionalhistory.asp | x_refsource_CONFIRM | |
http://www.mailenable.com/enterprisehistory.asp | x_refsource_CONFIRM | |
http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html | mailing-list, x_refsource_FULLDISC | |
http://www.mailenable.com/standardhistory.asp | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:50:05.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/standardhistory.asp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-02-12T11:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/standardhistory.asp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-6997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mailenable.com/professionalhistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "name": "http://www.mailenable.com/enterprisehistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html" }, { "name": "http://www.mailenable.com/standardhistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/standardhistory.asp" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-6997", "datePublished": "2007-02-12T11:00:00Z", "dateReserved": "2007-02-12T00:00:00Z", "dateUpdated": "2024-09-17T02:33:03.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-1275 (GCVE-0-2008-1275)
Vulnerability from cvelistv5
Published
2008-03-10 23:00
Modified
2024-08-07 08:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/5235 | exploit, x_refsource_EXPLOIT-DB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41083 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/28154 | vdb-entry, x_refsource_BID | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2008/0800/references | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/29300 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.526Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "5235", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5235" }, { "name": "mailenable-expn-vrfy-dos(41083)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083" }, { "name": "28154", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28154" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "ADV-2008-0800", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0800/references" }, { "name": "29300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29300" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "5235", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5235" }, { "name": "mailenable-expn-vrfy-dos(41083)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083" }, { "name": "28154", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28154" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "ADV-2008-0800", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0800/references" }, { "name": "29300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29300" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1275", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "5235", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5235" }, { "name": "mailenable-expn-vrfy-dos(41083)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083" }, { "name": "28154", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28154" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "ADV-2008-0800", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0800/references" }, { "name": "29300", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29300" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1275", "datePublished": "2008-03-10T23:00:00", "dateReserved": "2008-03-10T00:00:00", "dateUpdated": "2024-08-07T08:17:34.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-6605 (GCVE-0-2006-6605)
Vulnerability from cvelistv5
Published
2006-12-19 19:00
Modified
2024-08-07 20:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1017395 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/23127 | third-party-advisory, x_refsource_SECUNIA | |
http://securityreason.com/securityalert/2053 | third-party-advisory, x_refsource_SREASON | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/21645 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/454713/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/secunia_research/2006-75/advisory/ | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2006/5052 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:33:59.771Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1017395", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017395" }, { "name": "23127", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23127" }, { "name": "2053", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2053" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "21645", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21645" }, { "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-75/advisory/" }, { "name": "ADV-2006-5052", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/5052" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-12-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "1017395", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017395" }, { "name": "23127", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23127" }, { "name": "2053", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2053" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "21645", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21645" }, { "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-75/advisory/" }, { "name": "ADV-2006-5052", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/5052" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2006-6605", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1017395", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017395" }, { "name": "23127", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23127" }, { "name": "2053", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2053" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "21645", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21645" }, { "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded" }, { "name": "http://secunia.com/secunia_research/2006-75/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-75/advisory/" }, { "name": "ADV-2006-5052", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/5052" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2006-6605", "datePublished": "2006-12-19T19:00:00", "dateReserved": "2006-12-17T00:00:00", "dateUpdated": "2024-08-07T20:33:59.771Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-4616 (GCVE-0-2006-4616)
Vulnerability from cvelistv5
Published
2006-09-07 00:00
Modified
2024-08-07 19:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2006/3669 | vdb-entry, x_refsource_VUPEN | |
http://securitytracker.com/id?1016792 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28910 | vdb-entry, x_refsource_XF | |
http://www.mailenable.com/hotfix/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/20091 | vdb-entry, x_refsource_BID | |
http://www.mailenable.com/hotfix/MESMTPC.ZIP | x_refsource_CONFIRM | |
http://secunia.com/advisories/21998 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:14:47.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-3669", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3669" }, { "name": "1016792", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016792" }, { "name": "mailenable-spf-dos(28910)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "20091", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20091" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP" }, { "name": "21998", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21998" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2006-3669", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3669" }, { "name": "1016792", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016792" }, { "name": "mailenable-spf-dos(28910)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/" }, { "name": "20091", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20091" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP" }, { "name": "21998", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21998" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4616", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-3669", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3669" }, { "name": "1016792", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016792" }, { "name": "mailenable-spf-dos(28910)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910" }, { "name": "http://www.mailenable.com/hotfix/", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/" }, { "name": "20091", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20091" }, { "name": "http://www.mailenable.com/hotfix/MESMTPC.ZIP", "refsource": "CONFIRM", "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP" }, { "name": "21998", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21998" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4616", "datePublished": "2006-09-07T00:00:00", "dateReserved": "2006-09-06T00:00:00", "dateUpdated": "2024-08-07T19:14:47.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2223 (GCVE-0-2005-2223)
Vulnerability from cvelistv5
Published
2005-07-12 04:00
Modified
2024-09-17 03:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication.
References
▼ | URL | Tags |
---|---|---|
http://www.mailenable.com/professionalhistory.asp | x_refsource_CONFIRM | |
http://securitytracker.com/id?1014427 | vdb-entry, x_refsource_SECTRACK | |
http://www.mailenable.com/standardhistory.asp | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:22:47.692Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "name": "1014427", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014427" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/standardhistory.asp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-07-12T04:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "name": "1014427", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014427" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/standardhistory.asp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2223", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mailenable.com/professionalhistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "name": "1014427", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014427" }, { "name": "http://www.mailenable.com/standardhistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/standardhistory.asp" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2223", "datePublished": "2005-07-12T04:00:00Z", "dateReserved": "2005-07-12T00:00:00Z", "dateUpdated": "2024-09-17T03:28:28.078Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-0804 (GCVE-0-2005-0804)
Vulnerability from cvelistv5
Published
2005-03-20 05:00
Modified
2024-08-07 21:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=111108519331738&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/14627 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/12833 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:28:28.748Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2" }, { "name": "14627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14627" }, { "name": "12833", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12833" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2" }, { "name": "14627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14627" }, { "name": "12833", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12833" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0804", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2" }, { "name": "14627", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14627" }, { "name": "12833", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12833" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0804", "datePublished": "2005-03-20T05:00:00", "dateReserved": "2005-03-20T00:00:00", "dateUpdated": "2024-08-07T21:28:28.748Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-1792 (GCVE-0-2006-1792)
Vulnerability from cvelistv5
Published
2006-04-15 10:00
Modified
2024-09-17 00:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337.
References
▼ | URL | Tags |
---|---|---|
http://www.mailenable.com/professionalhistory.asp | x_refsource_CONFIRM | |
http://www.mailenable.com/enterprisehistory.asp | x_refsource_CONFIRM | |
http://www.mailenable.com/standardhistory.asp | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:27:28.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mailenable.com/standardhistory.asp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-04-15T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mailenable.com/standardhistory.asp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1792", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mailenable.com/professionalhistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "name": "http://www.mailenable.com/enterprisehistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "name": "http://www.mailenable.com/standardhistory.asp", "refsource": "CONFIRM", "url": "http://www.mailenable.com/standardhistory.asp" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1792", "datePublished": "2006-04-15T10:00:00Z", "dateReserved": "2006-04-15T00:00:00Z", "dateUpdated": "2024-09-17T00:56:41.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2006-12-19 19:28
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | * | |
mailenable | mailenable_enterprise | 1.41 | |
mailenable | mailenable_professional | * | |
mailenable | mailenable_professional | 1.84 | |
mailenable | mailenable_standard | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D4ECC9C-9D19-41F8-8A9A-86CDAAF591AB", "versionEndIncluding": "2.35", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D83D1EA7-A3D6-41AA-B922-18885328D292", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "7173C4E7-ACB7-4277-B4E8-79E655B97EEF", "versionEndIncluding": "2.35", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*", "matchCriteriaId": "201B610A-DD27-48D2-A3EF-DFEBBDEA04BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AAE8D3D-FF57-49B1-AE03-3ADB815A5DE8", "versionEndIncluding": "1.98", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el servicio POP de MailEnable Standard 1.98 y anteriores ; Professional 1.84, y 2.35 y anteriores; y Enterprise 1.41, y 2.35 y anteriores a ME-10026 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un argumento largo al comando PASS." } ], "id": "CVE-2006-6605", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-19T19:28:00.000", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23127" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-75/advisory/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://securityreason.com/securityalert/2053" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://securitytracker.com/id?1017395" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/21645" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.vupen.com/english/advisories/2006/5052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/23127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-75/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2053" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/21645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/5052" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-07-12 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_professional | 1.2 | |
mailenable | mailenable_professional | 1.2a | |
mailenable | mailenable_professional | 1.5 | |
mailenable | mailenable_professional | 1.17 | |
mailenable | mailenable_professional | 1.18 | |
mailenable | mailenable_professional | 1.19 | |
mailenable | mailenable_professional | 1.51 | |
mailenable | mailenable_professional | 1.52 | |
mailenable | mailenable_professional | 1.53 | |
mailenable | mailenable_professional | 1.54 | |
mailenable | mailenable_standard | 1.8 | |
mailenable | mailenable_standard | 1.71 | |
mailenable | mailenable_standard | 1.72 | |
mailenable | mailenable_standard | 1.701 | |
mailenable | mailenable_standard | 1.702 | |
mailenable | mailenable_standard | 1.703 | |
mailenable | mailenable_standard | 1.704 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*", "matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*", "matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*", "matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*", "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*", "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*", "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*", "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "34E00689-F421-4B3B-96D7-14DC66DB42B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*", "matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*", "matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*", "matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*", "matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*", "matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*", "matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication." } ], "id": "CVE-2005-2223", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-07-12T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1014427" }, { "source": "cve@mitre.org", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "cve@mitre.org", "url": "http://www.mailenable.com/standardhistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1014427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mailenable.com/standardhistory.asp" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-04-15 10:02
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*", "matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*", "matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*", "matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*", "matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*", "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*", "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*", "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*", "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*", "matchCriteriaId": "93A9222A-6F22-40BD-8411-69A90E8E46AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*", "matchCriteriaId": "6F4AADE9-F3FB-4272-8026-58FC677D3F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*", "matchCriteriaId": "9DD53801-B8F7-4AE8-BA2B-AC6297340CB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "34E00689-F421-4B3B-96D7-14DC66DB42B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "51B4AA11-F7A1-4297-B6B7-68A815FCE189", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*", "matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*", "matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.91:*:*:*:*:*:*:*", "matchCriteriaId": "E1517796-B826-40A3-9654-3BA1DA4E4CC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.92:*:*:*:*:*:*:*", "matchCriteriaId": "735523E7-25D9-4541-B389-D1098052F841", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.93:*:*:*:*:*:*:*", "matchCriteriaId": "E67F8892-2A24-4EF4-ABFA-E7651DF4C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*", "matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*", "matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*", "matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*", "matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337." } ], "id": "CVE-2006-1792", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-04-15T10:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "cve@mitre.org", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "cve@mitre.org", "url": "http://www.mailenable.com/standardhistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mailenable.com/standardhistory.asp" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-10 23:44
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | * | |
mailenable | mailenable_professional | * | |
mailenable | mailenable_standard | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DDBCAC5-9215-487B-BFC1-A55982352714", "versionEndIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "77ED3854-23DD-4153-8A40-F26F975CAE72", "versionEndIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*", "matchCriteriaId": "B924438E-5E77-43D5-873C-70F1B2FE4191", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en el servicio SMTP de MailEnable Standard Edition 1.x, Professional Edition 3.x y anteriores, y Enterprise Edition 3.x y anteriores, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante los comandos manipulados (1) EXPN o (2) VRFY." } ], "id": "CVE-2008-1275", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-10T23:44:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29300" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28154" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0800/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/5235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0800/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5235" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-09-07 00:04
Modified
2025-04-03 01:03
Severity ?
Summary
SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | * | |
mailenable | mailenable_professional | * | |
mailenable | mailenable_standard | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "794B82C8-E0B2-4B79-BF36-3FB9E09AE5FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "matchCriteriaId": "F99747EE-1CD0-4DD1-93BD-ACA95EC5B2CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*", "matchCriteriaId": "B924438E-5E77-43D5-873C-70F1B2FE4191", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception." }, { "lang": "es", "value": "El servicio SMTP en MailEnable Standard, Professional, y Enterprise anterior a ME-10014 (04/09/2006) permite a un atacante remoto provocar denegaci\u00f3n de servicio a trav\u00e9s de una b\u00fasqueda SPF para un dominio con un gran n\u00famero de registros, lo cual dispara una excepci\u00f3n de puntero nulo." } ], "id": "CVE-2006-4616", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-09-07T00:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21998" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016792" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/20091" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3669" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21998" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/20091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3669" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_standard | 1.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "34E00689-F421-4B3B-96D7-14DC66DB42B3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field." } ], "id": "CVE-2005-0804", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/14627" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/12833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/14627" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/12833" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-02-12 11:28
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mailenable | mailenable_enterprise | 1.0 | |
mailenable | mailenable_enterprise | 1.00 | |
mailenable | mailenable_enterprise | 1.1 | |
mailenable | mailenable_enterprise | 1.01 | |
mailenable | mailenable_enterprise | 1.02 | |
mailenable | mailenable_enterprise | 1.2 | |
mailenable | mailenable_enterprise | 1.03 | |
mailenable | mailenable_enterprise | 1.04 | |
mailenable | mailenable_standard | 1.71 | |
mailenable | mailenable_standard | 1.72 | |
mailenable | mailenable_standard | 1.701 | |
mailenable | mailenable_standard | 1.702 | |
mailenable | mailenable_standard | 1.703 | |
mailenable | mailenable_standard | 1.704 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E228B31-0D62-41E3-A475-550BBFAA4336", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*", "matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*", "matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*", "matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*", "matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*", "matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*", "matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792." }, { "lang": "es", "value": "Vulnerabilidad no especificada en la caracter\u00edstica cryptographic en MailEnable Standard Edition anetrior a 1.93, Professional Edition anterior a 1.73, y Enterprise Edition anterior a 1.21 lleva a \"validaci\u00f3n de seguridad debil\" con un impacto desconocido y vectores de ataque, NOTA: debido a la escasez de detalles, no es\u00e1 claro si esto es lo mismo que CVE-2006-1792." } ], "id": "CVE-2006-6997", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-02-12T11:28:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mailenable.com/standardhistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mailenable.com/enterprisehistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mailenable.com/professionalhistory.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mailenable.com/standardhistory.asp" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }