Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mailenable mailenable enterprise 2.32 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2006-6239
webadmin in MailEnable NetWebAdmin Professional 2.32 and Enterprise 2.32 allows remote malicious users to authenticate using an empty password.
Mailenable Netwebadmin Enterprise 2.32
Mailenable Netwebadmin Professional 2.32
10
CVSSv2
CVE-2006-6423
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 up to and including 2.35, Professional Edition 1.6 up to and including 1.84, and Enterprise Edition 1.1 up to and including 1.41 allows remote malicious users to execute arbitra...
Mailenable Mailenable Enterprise 1.16
Mailenable Mailenable Enterprise 1.17
Mailenable Mailenable Enterprise 1.24
Mailenable Mailenable Enterprise 1.25
Mailenable Mailenable Enterprise 1.32
Mailenable Mailenable Enterprise 1.33
Mailenable Mailenable Enterprise 1.41
Mailenable Mailenable Enterprise 2.35
Mailenable Mailenable Enterprise 1.13
Mailenable Mailenable Enterprise 1.14
Mailenable Mailenable Enterprise 1.15
Mailenable Mailenable Enterprise 1.22
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.30
Mailenable Mailenable Enterprise 1.31
Mailenable Mailenable Enterprise 1.39
Mailenable Mailenable Enterprise 1.40
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.12
Mailenable Mailenable Enterprise 1.2
Mailenable Mailenable Enterprise 1.21
Mailenable Mailenable Enterprise 1.28
3 EDB exploits
5
CVSSv2
CVE-2006-6484
The IMAP service for MailEnable Professional and Enterprise Edition 2.0 up to and including 2.34, Professional Edition 1.6 up to and including 1.83, and Enterprise Edition 1.1 up to and including 1.40 allows remote malicious users to cause a denial of service (crash) via unspecif...
Mailenable Mailenable Enterprise 1.13
Mailenable Mailenable Enterprise 1.14
Mailenable Mailenable Enterprise 1.22
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.30
Mailenable Mailenable Enterprise 1.31
Mailenable Mailenable Enterprise 1.38
Mailenable Mailenable Enterprise 1.39
Mailenable Mailenable Professional 1.6
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.12
Mailenable Mailenable Enterprise 1.2
Mailenable Mailenable Enterprise 1.21
Mailenable Mailenable Enterprise 1.28
Mailenable Mailenable Enterprise 1.29
Mailenable Mailenable Enterprise 1.36
Mailenable Mailenable Enterprise 1.37
Mailenable Mailenable Enterprise 2.33
Mailenable Mailenable Enterprise 2.34
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Enterprise 1.17
Mailenable Mailenable Enterprise 1.18
6.5
CVSSv2
CVE-2006-6290
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 up to and including 1.82 and 2.0 up to and including 2.33, and MailEnable Enterprise 1.1 up to and including 1.30 and 2.0 up to and including 2.33 allow remote authenticated user...
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.12
Mailenable Mailenable Enterprise 1.19
Mailenable Mailenable Enterprise 1.2
Mailenable Mailenable Enterprise 1.27
Mailenable Mailenable Enterprise 1.28
Mailenable Mailenable Enterprise 1.29
Mailenable Mailenable Enterprise 2.06
Mailenable Mailenable Enterprise 2.07
Mailenable Mailenable Enterprise 2.14
Mailenable Mailenable Enterprise 2.15
Mailenable Mailenable Enterprise 2.23
Mailenable Mailenable Enterprise 2.24
Mailenable Mailenable Enterprise 2.31
Mailenable Mailenable Enterprise 2.32
Mailenable Mailenable Enterprise 1.15
Mailenable Mailenable Enterprise 1.16
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.24
Mailenable Mailenable Enterprise 2.01
Mailenable Mailenable Enterprise 2.03
Mailenable Mailenable Enterprise 2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started