Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mailenable mailenable professional vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2005-1348
Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and previous versions and Professional 1.54 and previous versions allows remote malicious users to execute arbitrary code via a long HTTP Authorization header.
Mailenable Mailenable Enterprise
Mailenable Mailenable Professional
2 EDB exploits
7.5
CVSSv2
CVE-2005-3690
Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and previous versions and Enterprise 1.1 and previous versions allows remote malicious users to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (...
Mailenable Mailenable Professional
Mailenable Mailenable Enterprise
9
CVSSv2
CVE-2007-1301
Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and previous versions allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423...
Mailenable Mailenable Enterprise
Mailenable Mailenable Professional 2.37
1 EDB exploit
7.8
CVSSv2
CVE-2005-4456
Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands. NOTE: it is possible t...
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Professional 1.71
1 EDB exploit
9.3
CVSSv2
CVE-2006-5176
Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote malicious users to execute arbitrary code via "the signature field of NTLM Type 1 messages".
Mailenable Mailenable Enterprise 2.0
Mailenable Mailenable Professional 2.0
9.3
CVSSv2
CVE-2006-5177
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote malicious users to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Ty...
Mailenable Mailenable Enterprise 2.0
Mailenable Mailenable Professional 2.0
1 EDB exploit
4
CVSSv2
CVE-2005-3813
IMAP service (meimaps.exe) of MailEnable Professional 1.7 and Enterprise 1.1 allows remote authenticated malicious users to cause a denial of service (application crash) by using RENAME with a non-existent mailbox, a different vulnerability than CVE-2005-3690.
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Professional 1.7
1 EDB exploit
7.5
CVSSv2
CVE-2004-2501
Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote malicious users to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection.
Mailenable Mailenable Enterprise 1.01
Mailenable Mailenable Professional 1.52
1 EDB exploit
7.5
CVSSv2
CVE-2005-3155
Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote malicious users to execute arbitrary code.
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Professional 1.6
2 EDB exploits
7.2
CVSSv2
CVE-2005-2278
Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
Mailenable Mailenable Professional 1.54
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »