Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dovecot dovecot 1.1.5 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2008-4907
The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote malicious users to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "...
Dovecot Dovecot 1.1.4
Dovecot Dovecot 1.1.5
1 EDB exploit
7.5
CVSSv2
CVE-2009-3235
Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 prior to 1.0.4 and 1.1 prior to 1.1.7, as derived from Cyrus libsieve, allow context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE scr...
Dovecot Dovecot 1.0.2
Dovecot Dovecot 1.0.3
Dovecot Dovecot 1.1.5
Dovecot Dovecot 1.1.6
Dovecot Dovecot 1.0.1
Dovecot Dovecot 1.1.1
Dovecot Dovecot 1.1.2
Dovecot Dovecot 1.1
Dovecot Dovecot 1.1.0
Dovecot Dovecot 1.0
Dovecot Dovecot 1.1.3
Dovecot Dovecot 1.1.4
6.4
CVSSv2
CVE-2008-5301
Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote malicious users to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
Dovecot Dovecot 1.0.12
Dovecot Dovecot 1.0.3
Dovecot Dovecot 1.0.9
Dovecot Dovecot 1.1
Dovecot Dovecot 1.0
Dovecot Dovecot 1.0.2
Dovecot Dovecot 1.0.10
Dovecot Dovecot 1.0.6
Dovecot Dovecot 1.1.2
Dovecot Dovecot 1.1.3
Dovecot Dovecot 1.0.4
Dovecot Dovecot 1.0.5
Dovecot Dovecot 1.1.0
Dovecot Dovecot 1.1.1
Dovecot Dovecot 0.99.13
Dovecot Dovecot 0.99.14
Dovecot Dovecot 1.0.7
Dovecot Dovecot 1.0.8
Dovecot Dovecot 1.1.4
Dovecot Dovecot 1.1.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started