Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mailenable mailenable professional vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2005-3690
Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and previous versions and Enterprise 1.1 and previous versions allows remote malicious users to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (...
Mailenable Mailenable Professional
Mailenable Mailenable Enterprise
7.5
CVSSv2
CVE-2005-1348
Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and previous versions and Professional 1.54 and previous versions allows remote malicious users to execute arbitrary code via a long HTTP Authorization header.
Mailenable Mailenable Enterprise
Mailenable Mailenable Professional
2 EDB exploits
9
CVSSv2
CVE-2007-1301
Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and previous versions allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423...
Mailenable Mailenable Enterprise
Mailenable Mailenable Professional 2.37
1 EDB exploit
7.8
CVSSv2
CVE-2005-4456
Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands. NOTE: it is possible t...
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Professional 1.71
1 EDB exploit
4
CVSSv2
CVE-2005-3813
IMAP service (meimaps.exe) of MailEnable Professional 1.7 and Enterprise 1.1 allows remote authenticated malicious users to cause a denial of service (application crash) by using RENAME with a non-existent mailbox, a different vulnerability than CVE-2005-3690.
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Professional 1.7
1 EDB exploit
7.5
CVSSv2
CVE-2005-3155
Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote malicious users to execute arbitrary code.
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Professional 1.6
2 EDB exploits
9.3
CVSSv2
CVE-2006-5176
Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote malicious users to execute arbitrary code via "the signature field of NTLM Type 1 messages".
Mailenable Mailenable Enterprise 2.0
Mailenable Mailenable Professional 2.0
9.3
CVSSv2
CVE-2006-5177
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote malicious users to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Ty...
Mailenable Mailenable Enterprise 2.0
Mailenable Mailenable Professional 2.0
1 EDB exploit
7.5
CVSSv2
CVE-2004-2501
Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote malicious users to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection.
Mailenable Mailenable Enterprise 1.01
Mailenable Mailenable Professional 1.52
1 EDB exploit
7.8
CVSSv2
CVE-2005-3993
Multiple unspecified vulnerabilities in MailEnable Professional 1.6 and previous versions and Enterprise 1.1 and previous versions allow malicious users to cause a denial of service (crash) via invalid IMAP commands.
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Professional
Mailenable Mailenable Enterprise 1.01
Mailenable Mailenable Enterprise 1.02
Mailenable Mailenable Enterprise 1.03
Mailenable Mailenable Enterprise 1.04
Mailenable Mailenable Enterprise 1.00
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »