Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mailenable mailenable professional vulnerabilities and exploits
(subscribe to this query)
760
VMScore
CVE-2005-1348
Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and previous versions and Professional 1.54 and previous versions allows remote malicious users to execute arbitrary code via a long HTTP Authorization header.
Mailenable Mailenable Enterprise
Mailenable Mailenable Professional
2 EDB exploits
655
VMScore
CVE-2005-4402
Buffer overflow in MailEnable Professional 1.71 and previous versions, and Enterprise 1.1 and previous versions, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command.
Mailenable Mailenable Enterprise
Mailenable Mailenable Professional
1 EDB exploit
905
VMScore
CVE-2007-1301
Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and previous versions allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423...
Mailenable Mailenable Enterprise
Mailenable Mailenable Professional 2.37
1 EDB exploit
405
VMScore
CVE-2005-3813
IMAP service (meimaps.exe) of MailEnable Professional 1.7 and Enterprise 1.1 allows remote authenticated malicious users to cause a denial of service (application crash) by using RENAME with a non-existent mailbox, a different vulnerability than CVE-2005-3690.
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Professional 1.7
1 EDB exploit
760
VMScore
CVE-2005-3155
Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote malicious users to execute arbitrary code.
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Professional 1.6
2 EDB exploits
828
VMScore
CVE-2006-5176
Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote malicious users to execute arbitrary code via "the signature field of NTLM Type 1 messages".
Mailenable Mailenable Enterprise 2.0
Mailenable Mailenable Professional 2.0
935
VMScore
CVE-2006-5177
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote malicious users to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Ty...
Mailenable Mailenable Enterprise 2.0
Mailenable Mailenable Professional 2.0
1 EDB exploit
755
VMScore
CVE-2004-2501
Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote malicious users to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection.
Mailenable Mailenable Enterprise 1.01
Mailenable Mailenable Professional 1.52
1 EDB exploit
785
VMScore
CVE-2005-4456
Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands. NOTE: it is possible t...
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Professional 1.71
1 EDB exploit
694
VMScore
CVE-2005-3993
Multiple unspecified vulnerabilities in MailEnable Professional 1.6 and previous versions and Enterprise 1.1 and previous versions allow malicious users to cause a denial of service (crash) via invalid IMAP commands.
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Professional
Mailenable Mailenable Enterprise 1.01
Mailenable Mailenable Enterprise 1.02
Mailenable Mailenable Enterprise 1.03
Mailenable Mailenable Enterprise 1.04
Mailenable Mailenable Enterprise 1.00
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »