Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mailenable mailenable enterprise 1.41 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2006-6605
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and previous versions; Professional 1.84, and 2.35 and previous versions; and Enterprise 1.41, and 2.35 and previous versions before ME-10026 allows remote malicious users to execute arbitrary code via a l...
Mailenable Mailenable Enterprise 1.41
Mailenable Mailenable Professional
Mailenable Mailenable Standard
Mailenable Mailenable Professional 1.84
Mailenable Mailenable Enterprise
10
CVSSv2
CVE-2006-6423
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 up to and including 2.35, Professional Edition 1.6 up to and including 1.84, and Enterprise Edition 1.1 up to and including 1.41 allows remote malicious users to execute arbitra...
Mailenable Mailenable Enterprise 1.16
Mailenable Mailenable Enterprise 1.17
Mailenable Mailenable Enterprise 1.24
Mailenable Mailenable Enterprise 1.25
Mailenable Mailenable Enterprise 1.32
Mailenable Mailenable Enterprise 1.33
Mailenable Mailenable Enterprise 1.41
Mailenable Mailenable Enterprise 2.35
Mailenable Mailenable Enterprise 1.13
Mailenable Mailenable Enterprise 1.14
Mailenable Mailenable Enterprise 1.15
Mailenable Mailenable Enterprise 1.22
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.30
Mailenable Mailenable Enterprise 1.31
Mailenable Mailenable Enterprise 1.39
Mailenable Mailenable Enterprise 1.40
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.12
Mailenable Mailenable Enterprise 1.2
Mailenable Mailenable Enterprise 1.21
Mailenable Mailenable Enterprise 1.28
3 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started