Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
imap vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2011-0919
Multiple stack-based buffer overflows in the (1) POP3 and (2) IMAP services in IBM Lotus Domino allow remote malicious users to execute arbitrary code via non-printable characters in an envelope sender address, aka SPR KLYH87LLVJ.
Ibm Lotus Domino
10
CVSSv2
CVE-2010-4711
Double free vulnerability in the IMAP server component in GroupWise Internet Agent (GWIA) in Novell GroupWise prior to 8.02HP allows remote malicious users to execute arbitrary code via a large parameter in a LIST command.
Novell Groupwise 5.57e
Novell Groupwise 6.0
Novell Groupwise 6.0.1
Novell Groupwise 6.5
Novell Groupwise 7.0
Novell Groupwise 7.0.2
Novell Groupwise 7.0.3
Novell Groupwise 4.1a
Novell Groupwise 5.1
Novell Groupwise 5.5
Novell Groupwise 6.5.2
Novell Groupwise 7.0.4
Novell Groupwise 8.0
Novell Groupwise
Novell Groupwise 5.2
Novell Groupwise 4.1
Novell Groupwise 6.5.4
Novell Groupwise 6.5.6
Novell Groupwise 6.5.7
Novell Groupwise 5.0
Novell Groupwise 6.5.3
Novell Groupwise 7.0.1
1 EDB exploit
10
CVSSv2
CVE-2008-5005
Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and previous versions, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the...
University Of Washington Alpine 0.82
University Of Washington Alpine 0.999999
University Of Washington Alpine 0.98
University Of Washington Alpine 1.00
University Of Washington Alpine 1.10
University Of Washington Alpine 0.99
University Of Washington Alpine 0.81
University Of Washington Imap Toolkit 2003
University Of Washington Imap Toolkit 2005
University Of Washington Imap Toolkit 2002
University Of Washington Alpine 2.00
University Of Washington Imap Toolkit 2007c
University Of Washington Alpine 0.80
University Of Washington Alpine 0.99999
University Of Washington Alpine 0.999
University Of Washington Alpine 0.9999
University Of Washington Imap Toolkit 2006
University Of Washington Imap Toolkit 2004
University Of Washington Imap Toolkit 2007
University Of Washington Alpine 0.83
10
CVSSv2
CVE-2007-5466
Multiple buffer overflows in eXtremail 2.1.1 and previous versions allow remote malicious users to (1) have an unknown impact by sending multiple long strings to the IMAP port (143/tcp); (2) execute arbitrary code via a long string in an IMAP AUTHENTICATE PLAIN action, involving ...
Extremail Extremail
3 EDB exploits
10
CVSSv2
CVE-2007-2173
Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP prior to 4.0.6-r2, and 4.1.x prior to 4.1.2-r1, on Gentoo Linux allows remote malicious users to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN...
Double Precision Incorporated Courier-imap 4.0.0
Double Precision Incorporated Courier-imap 4.0.1
Double Precision Incorporated Courier-imap 4.1.0
Double Precision Incorporated Courier-imap 4.1.1
Double Precision Incorporated Courier-imap 4.0.2
Double Precision Incorporated Courier-imap 4.0.3
Double Precision Incorporated Courier-imap 4.0.4
Double Precision Incorporated Courier-imap 4.0.5
10
CVSSv2
CVE-2007-1675
Buffer overflow in the CRAM-MD5 authentication mechanism in the IMAP server (nimap.exe) in IBM Lotus Domino prior to 6.5.6 and 7.x prior to 7.0.2 FP1 allows remote malicious users to cause a denial of service via a long username.
Ibm Lotus Domino 6.5.0
Ibm Lotus Domino 6.5.1
Ibm Lotus Domino 6.5.5
Ibm Lotus Domino 7.0
Ibm Lotus Domino 6.5.4
Ibm Lotus Domino 6.5.2
Ibm Lotus Domino 6.5.3
Ibm Lotus Domino 7.0.1
Ibm Lotus Domino 7.0.2
3 EDB exploits
10
CVSSv2
CVE-2007-1579
Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote malicious users to have an unknown impact via a certain SUBSCRIBE command.
Atrium Software Mercur Messaging 2005 Sp4
Atrium Software Mercur Imapd
Atrium Software Mercur Messaging 2005 5.0 Sp3
1 EDB exploit
10
CVSSv2
CVE-2007-1373
Stack-based buffer overflow in Mercury/32 (aka Mercury Mail Transport System) 4.01b and previous versions allows remote malicious users to execute arbitrary code via a long LOGIN command. NOTE: this might be the same issue as CVE-2006-5961.
Pmail Mercury Mail Transport System
3 EDB exploits
10
CVSSv2
CVE-2006-6423
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 up to and including 2.35, Professional Edition 1.6 up to and including 1.84, and Enterprise Edition 1.1 up to and including 1.41 allows remote malicious users to execute arbitra...
Mailenable Mailenable Enterprise 1.16
Mailenable Mailenable Enterprise 1.17
Mailenable Mailenable Enterprise 1.24
Mailenable Mailenable Enterprise 1.25
Mailenable Mailenable Enterprise 1.32
Mailenable Mailenable Enterprise 1.33
Mailenable Mailenable Enterprise 1.41
Mailenable Mailenable Enterprise 2.35
Mailenable Mailenable Enterprise 1.13
Mailenable Mailenable Enterprise 1.14
Mailenable Mailenable Enterprise 1.15
Mailenable Mailenable Enterprise 1.22
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.30
Mailenable Mailenable Enterprise 1.31
Mailenable Mailenable Enterprise 1.39
Mailenable Mailenable Enterprise 1.40
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.12
Mailenable Mailenable Enterprise 1.2
Mailenable Mailenable Enterprise 1.21
Mailenable Mailenable Enterprise 1.28
3 EDB exploits
10
CVSSv2
CVE-2006-1255
Stack-based buffer overflow in the IMAP service in Mercur Messaging 5.0 SP3 and previous versions allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string to the (1) LOGIN or (2) SELECT command, a differe...
Mercur Mercur Messaging
6 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4040
cross-site scripting
CVE-2023-25790
CVE-2024-2961
XML external entity
CVE-2024-26926
CVE-2024-32806
CVE-2024-32711
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »