Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mailenable mailenable enterprise 2.0 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2006-5177
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote malicious users to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Ty...
Mailenable Mailenable Enterprise 2.0
Mailenable Mailenable Professional 2.0
1 EDB exploit
9.3
CVSSv2
CVE-2006-5176
Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote malicious users to execute arbitrary code via "the signature field of NTLM Type 1 messages".
Mailenable Mailenable Enterprise 2.0
Mailenable Mailenable Professional 2.0
5
CVSSv2
CVE-2006-6484
The IMAP service for MailEnable Professional and Enterprise Edition 2.0 up to and including 2.34, Professional Edition 1.6 up to and including 1.83, and Enterprise Edition 1.1 up to and including 1.40 allows remote malicious users to cause a denial of service (crash) via unspecif...
Mailenable Mailenable Enterprise 1.13
Mailenable Mailenable Enterprise 1.14
Mailenable Mailenable Enterprise 1.22
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.30
Mailenable Mailenable Enterprise 1.31
Mailenable Mailenable Enterprise 1.38
Mailenable Mailenable Enterprise 1.39
Mailenable Mailenable Professional 1.6
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.12
Mailenable Mailenable Enterprise 1.2
Mailenable Mailenable Enterprise 1.21
Mailenable Mailenable Enterprise 1.28
Mailenable Mailenable Enterprise 1.29
Mailenable Mailenable Enterprise 1.36
Mailenable Mailenable Enterprise 1.37
Mailenable Mailenable Enterprise 2.33
Mailenable Mailenable Enterprise 2.34
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Enterprise 1.17
Mailenable Mailenable Enterprise 1.18
6.5
CVSSv2
CVE-2006-6290
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 up to and including 1.82 and 2.0 up to and including 2.33, and MailEnable Enterprise 1.1 up to and including 1.30 and 2.0 up to and including 2.33 allow remote authenticated user...
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.12
Mailenable Mailenable Enterprise 1.19
Mailenable Mailenable Enterprise 1.2
Mailenable Mailenable Enterprise 1.27
Mailenable Mailenable Enterprise 1.28
Mailenable Mailenable Enterprise 1.29
Mailenable Mailenable Enterprise 2.06
Mailenable Mailenable Enterprise 2.07
Mailenable Mailenable Enterprise 2.14
Mailenable Mailenable Enterprise 2.15
Mailenable Mailenable Enterprise 2.23
Mailenable Mailenable Enterprise 2.24
Mailenable Mailenable Enterprise 2.31
Mailenable Mailenable Enterprise 2.32
Mailenable Mailenable Enterprise 1.15
Mailenable Mailenable Enterprise 1.16
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.24
Mailenable Mailenable Enterprise 2.01
Mailenable Mailenable Enterprise 2.03
Mailenable Mailenable Enterprise 2.1
10
CVSSv2
CVE-2006-6423
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 up to and including 2.35, Professional Edition 1.6 up to and including 1.84, and Enterprise Edition 1.1 up to and including 1.41 allows remote malicious users to execute arbitra...
Mailenable Mailenable Enterprise 1.16
Mailenable Mailenable Enterprise 1.17
Mailenable Mailenable Enterprise 1.24
Mailenable Mailenable Enterprise 1.25
Mailenable Mailenable Enterprise 1.32
Mailenable Mailenable Enterprise 1.33
Mailenable Mailenable Enterprise 1.41
Mailenable Mailenable Enterprise 2.35
Mailenable Mailenable Enterprise 1.13
Mailenable Mailenable Enterprise 1.14
Mailenable Mailenable Enterprise 1.15
Mailenable Mailenable Enterprise 1.22
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.30
Mailenable Mailenable Enterprise 1.31
Mailenable Mailenable Enterprise 1.39
Mailenable Mailenable Enterprise 1.40
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.12
Mailenable Mailenable Enterprise 1.2
Mailenable Mailenable Enterprise 1.21
Mailenable Mailenable Enterprise 1.28
3 EDB exploits
5
CVSSv2
CVE-2006-3277
The SMTP service of MailEnable Standard 1.92 and previous versions, Professional 2.0 and previous versions, and Enterprise 2.0 and previous versions before the MESMTPC hotfix, allows remote malicious users to cause a denial of service (application crash) via a HELO command with a...
Mailenable Mailenable Professional 1.0.007
Mailenable Mailenable Professional 1.0.008
Mailenable Mailenable Professional 1.0.016
Mailenable Mailenable Professional 1.0.017
Mailenable Mailenable Professional 1.106
Mailenable Mailenable Professional 1.107
Mailenable Mailenable Professional 1.114
Mailenable Mailenable Professional 1.115
Mailenable Mailenable Professional 1.18
Mailenable Mailenable Professional 1.19
Mailenable Mailenable Professional 1.5018
Mailenable Mailenable Professional 1.51
Mailenable Mailenable Professional 1.701
Mailenable Mailenable Professional 1.702
Mailenable Mailenable Professional 1.91
Mailenable Mailenable Professional 1.92
Mailenable Mailenable Enterprise
Mailenable Mailenable Professional 1.0.005
Mailenable Mailenable Professional 1.0.006
Mailenable Mailenable Professional 1.0.013
Mailenable Mailenable Professional 1.0.014
Mailenable Mailenable Professional 1.0.015
1 EDB exploit
6.8
CVSSv2
CVE-2006-6291
Stack overflow in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 up to and including 1.83 and 2.0 up to and including 2.33, and MailEnable Enterprise 1.1 up to and including 1.40 and 2.0 up to and including 2.33, allows remote authenticated users to cause a denial o...
Mailenable Mailenable
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started