Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
messaging server vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2011-1901
The mail-filter web interface in Proofpoint Messaging Security Gateway 6.2.0.263:6.2.0.237 and previous versions in Proofpoint Protection Server 5.5.3, 5.5.4, 5.5.5, 6.0.2, 6.1.1, and 6.2.0 allows remote malicious users to bypass authentication via unspecified vectors.
Proofpoint Protection Server 5.5.3
Proofpoint Protection Server 5.5.4
Proofpoint Protection Server 6.0.2
Proofpoint Protection Server 6.2.0
Proofpoint Messaging Security Gateway
Proofpoint Protection Server 5.5.5
Proofpoint Protection Server 6.1.1
668
VMScore
CVE-2011-1904
An unspecified function in the web interface in Proofpoint Messaging Security Gateway 6.2.0.263:6.2.0.237 and previous versions in Proofpoint Protection Server 5.5.3, 5.5.4, 5.5.5, 6.0.2, 6.1.1, and 6.2.0 allows remote malicious users to execute arbitrary commands via unknown vec...
Proofpoint Protection Server 5.5.5
Proofpoint Protection Server 6.1.1
Proofpoint Messaging Security Gateway
Proofpoint Protection Server 5.5.3
Proofpoint Protection Server 5.5.4
Proofpoint Protection Server 6.0.2
Proofpoint Protection Server 6.2.0
668
VMScore
CVE-2008-2433
The web management console in Trend Micro OfficeScan 7.0 up to and including 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote malicious users to hijac...
Trendmicro Client Server Messaging Suite 3.5
Trendmicro Client Server Messaging Suite 3.6
Trendmicro Officescan
Trendmicro Worry-free Business Security 5.0
668
VMScore
CVE-2008-3778
The remote management interface in SIP Enablement Services (SES) Server in Avaya SIP Enablement Services 5.0, and Communication Manager (CM) 5.0 on the S8300C with SES enabled, proceeds with Core router updates even when a login is invalid, which allows remote malicious users to ...
Avaya Sip Enablement Services 5.0
Avaya Communication Manager 5.0
668
VMScore
CVE-2005-4045
Unspecified vulnerability in System Communications Services 6 Delegated Administrator 2005Q1 in Sun Java System Messaging Server 2005Q1 allows remote malicious users to obtain the Top-Level Administrator (TLA) default password via unknown vectors, possibly involving configure_top...
Sun Java Communications Services Delegated Administrator 6
668
VMScore
CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI prior to 7.510, as used in multiple Trend Micro products, allows remote malicious users to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Trend Micro Control Manager Gold
Trend Micro Interscan Emanager 3.5.2
Trend Micro Interscan Emanager 3.6
Trend Micro Interscan Messaging Security Suite 5.5
Trend Micro Interscan Viruswall 3.5
Trend Micro Interscan Viruswall 3.52
Trend Micro Interscan Viruswall 5.1
Trend Micro Interscan Viruswall Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Interscan Webmanager 1.2
Trend Micro Interscan Webmanager 2.1
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 5.58
Trend Micro Pc-cillin 2000
Trend Micro Scanmail 2.51
Trend Micro Scanmail 3.8
Trend Micro Scanmail 6.1
Trend Micro Scanmail Gold
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Client-server Suite Smb Gold
Trend Micro Interscan Messaging Security Suite Gold
668
VMScore
CVE-2004-1307
Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote malicious users to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a ...
Avaya Call Management System Server 13.0
Avaya Call Management System Server 8.0
F5 Icontrol Service Manager 1.3
F5 Icontrol Service Manager 1.3.4
Libtiff Libtiff 3.5.4
Libtiff Libtiff 3.5.5
Conectiva Linux 9.0
Avaya Call Management System Server 11.0
Avaya Call Management System Server 12.0
Avaya Interactive Response 1.3
Avaya Intuity Audix Lx
Libtiff Libtiff 3.5.2
Libtiff Libtiff 3.5.3
Sgi Propack 3.0
Conectiva Linux 10.0
Avaya Integrated Management
Avaya Interactive Response
Avaya Interactive Response 1.2.1
Libtiff Libtiff 3.4
Libtiff Libtiff 3.5.1
Libtiff Libtiff 3.6.1
Libtiff Libtiff 3.7.0
668
VMScore
CVE-2004-0006
Multiple buffer overflows in Gaim 0.75 and previous versions, and Ultramagnetic prior to 0.81, allow remote malicious users to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web...
Ultramagnetic Ultramagnetic
Rob Flynn Gaim
668
VMScore
CVE-2004-1082
mod_digest_apple for Apache 1.3.31 and 1.3.32 on Mac OS X Server does not properly verify the nonce of a client response, which allows remote malicious users to replay credentials.
Apache Http Server 1.3.12
Apache Http Server 1.3.14
Apache Http Server 1.3.24
Apache Http Server 1.3.25
Apache Http Server 1.3.6
Apache Http Server 1.3.7
Apache Http Server 1.3.9
Hp Virtualvault 4.5
Hp Virtualvault 4.6
Apache Http Server 1.3
Apache Http Server 1.3.19
Apache Http Server 1.3.20
Apache Http Server 1.3.28
Apache Http Server 1.3.29
Avaya Communication Manager 1.3.1
Avaya Communication Manager 2.0
Hp Webproxy A.02.10
Ibm Http Server 1.3.19
Apache Http Server 1.3.17
Apache Http Server 1.3.18
Apache Http Server 1.3.26
Apache Http Server 1.3.27
668
VMScore
CVE-2002-2408
Gordano Messaging Server (GMS) Mail 8 (a.k.a. NTMail) only filters email messages for the first recipient, which allows remote malicious users to bypass JUCE filters by sending a message to more than one user on the GMS server.
Gordano Ntmail 8.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »