Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
novell netmail 3.52d vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2007-2616
Stack-based buffer overflow in the SSL version of the NMDMC.EXE service in Novell NetMail 3.52e FTF2 and probably earlier allows remote malicious users to execute arbitrary code via a crafted request.
Novell Netmail 3.52
Novell Netmail 3.52e
Novell Netmail 3.52a
Novell Netmail 3.52b
Novell Netmail 3.52c
Novell Netmail 3.52c1
Novell Netmail 3.52d
905
VMScore
CVE-2006-6425
Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail prior to 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.
Novell Netmail 3.1
Novell Netmail 3.10
Novell Netmail 3.0.3a
Novell Netmail 3.0.1
Novell Netmail 3.5
Novell Netmail
1 EDB exploit
905
VMScore
CVE-2006-6424
Multiple buffer overflows in Novell NetMail prior to 3.52e FTF2 allow remote malicious users to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow; and (2) via crafted argumen...
Novell Netmail 3.1
Novell Netmail 3.10
Novell Netmail 3.0.3a
Novell Netmail 3.0.1
Novell Netmail 3.5
Novell Netmail
1 EDB exploit
755
VMScore
CVE-2005-3314
Stack-based buffer overflow in the IMAP daemon in Novell Netmail 3.5.2 allows remote malicious users to execute arbitrary code via "long verb arguments."
Novell Netmail 3.5.2
1 EDB exploit
655
VMScore
CVE-2006-6761
Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail prior to 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
Novell Netmail 3.5.2
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started