Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mailenable mailenable enterprise 2.32 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-6239
webadmin in MailEnable NetWebAdmin Professional 2.32 and Enterprise 2.32 allows remote malicious users to authenticate using an empty password.
Mailenable Netwebadmin Professional 2.32
Mailenable Netwebadmin Enterprise 2.32
NA
CVE-2006-6484
The IMAP service for MailEnable Professional and Enterprise Edition 2.0 up to and including 2.34, Professional Edition 1.6 up to and including 1.83, and Enterprise Edition 1.1 up to and including 1.40 allows remote malicious users to cause a denial of service (crash) via unspecif...
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Enterprise 2.0
Mailenable Mailenable Enterprise 2.1
Mailenable Mailenable Enterprise 1.16
Mailenable Mailenable Enterprise 2.33
Mailenable Mailenable Professional 2.33
Mailenable Mailenable Enterprise 1.32
Mailenable Mailenable Enterprise 2.34
Mailenable Mailenable Enterprise 1.17
Mailenable Mailenable Enterprise 2.32
Mailenable Mailenable Enterprise 1.39
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.19
Mailenable Mailenable Professional 1.7
Mailenable Mailenable Enterprise 1.18
Mailenable Mailenable Enterprise 1.33
Mailenable Mailenable Enterprise 1.28
Mailenable Mailenable Professional 1.72
Mailenable Mailenable Professional 1.83
Mailenable Mailenable Enterprise 1.26
Mailenable Mailenable Enterprise 1.12
NA
CVE-2006-6423
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 up to and including 2.35, Professional Edition 1.6 up to and including 1.84, and Enterprise Edition 1.1 up to and including 1.41 allows remote malicious users to execute arbitra...
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Enterprise 1.16
Mailenable Mailenable Enterprise 1.32
Mailenable Mailenable Enterprise 1.41
Mailenable Mailenable Enterprise 1.17
Mailenable Mailenable Enterprise 1.39
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.19
Mailenable Mailenable Enterprise 1.18
Mailenable Mailenable Enterprise 1.33
Mailenable Mailenable Enterprise 1.28
Mailenable Mailenable Enterprise 2.35
Mailenable Mailenable Enterprise 1.26
Mailenable Mailenable Enterprise 1.12
Mailenable Mailenable Enterprise 1.24
Mailenable Mailenable Enterprise 1.29
Mailenable Mailenable Enterprise 1.35
Mailenable Mailenable Enterprise 1.21
Mailenable Mailenable Enterprise 1.14
Mailenable Mailenable Enterprise 1.38
Mailenable Mailenable Enterprise 1.30
3 EDB exploits
NA
CVE-2006-6290
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 up to and including 1.82 and 2.0 up to and including 2.33, and MailEnable Enterprise 1.1 up to and including 1.30 and 2.0 up to and including 2.33 allow remote authenticated user...
Mailenable Mailenable Enterprise 2.11
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Enterprise 2.0
Mailenable Mailenable Enterprise 2.1
Mailenable Mailenable Enterprise 2.30
Mailenable Mailenable Enterprise 1.16
Mailenable Mailenable Enterprise 2.03
Mailenable Mailenable Enterprise 2.31
Mailenable Mailenable Enterprise 2.33
Mailenable Mailenable Professional 2.33
Mailenable Mailenable Enterprise 2.28
Mailenable Mailenable Enterprise 2.19
Mailenable Mailenable Enterprise 2.12
Mailenable Mailenable Enterprise 2.25
Mailenable Mailenable Enterprise 2.15
Mailenable Mailenable Enterprise 1.17
Mailenable Mailenable Enterprise 2.04
Mailenable Mailenable Enterprise 2.32
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.19
Mailenable Mailenable Enterprise 2.08
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started