Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
imap vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2019-8613
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, tvOS 12.3, watchOS 5.2.1. A remote attacker may be able to cause arbitrary code execution.
Apple Iphone Os
Apple Tvos
Apple Watchos
1 EDB exploit
755
VMScore
CVE-2013-0249
Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 up to and including 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote malicious users to cause a denial of service (crash) and possib...
Haxx Curl 7.26.0
Haxx Libcurl 7.26.0
Haxx Curl 7.28.1
Haxx Libcurl 7.28.1
Haxx Curl 7.27.0
Haxx Libcurl 7.27.0
Haxx Curl 7.28.0
Haxx Libcurl 7.28.0
Canonical Ubuntu Linux 12.10
1 EDB exploit
755
VMScore
CVE-2007-5740
The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and previous versions allows remote malicious users to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
Vergenet Perdition Mail Retrieval Proxy
1 EDB exploit
755
VMScore
CVE-2006-5961
Buffer overflow in Mercury Mail Transport System 4.01b for Windows has unknown impact and attack vectors, as originally reported in a GLEG VulnDisco pack. NOTE: the provenance of this information is unknown; the details are obtained from third party information. The original rese...
Pegasus Mercury Mail Transport System 4.0.1b
1 EDB exploit
755
VMScore
CVE-2006-2646
Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and previous versions, allows remote malicious users to execute arbitrary code via a long A0001 argument that begins with a '"' (double quote).
Alt-n Mdaemon 2.8
Alt-n Mdaemon 3.5.0
Alt-n Mdaemon 3.5.1
Alt-n Mdaemon 5.0.2
Alt-n Mdaemon 5.0.3
Alt-n Mdaemon 6.0.6
Alt-n Mdaemon 6.0.7
Alt-n Mdaemon 6.8.1
Alt-n Mdaemon 6.8.2
Alt-n Mdaemon 8.1.4
Alt-n Mdaemon 9.0.1
Alt-n Mdaemon 3.0.4
Alt-n Mdaemon 3.1.1
Alt-n Mdaemon 3.5.4
Alt-n Mdaemon 3.5.6
Alt-n Mdaemon 5.0.6
Alt-n Mdaemon 5.0.7
Alt-n Mdaemon 6.5.2
Alt-n Mdaemon 6.7.5
Alt-n Mdaemon 6.8.5
Alt-n Mdaemon 7.2
Alt-n Mdaemon 2.8.5.0
1 EDB exploit
755
VMScore
CVE-2006-0637
Buffer overflow in cram.dll in QUALCOMM Eudora WorldMail 3.0 allows remote malicious users to execute arbitrary code via an IMAP APPEND command with a long message literal argument, as demonstrated by Worldmail.pl. NOTE: this is a different vector and a different manipulation tha...
Qualcomm Eudora Worldmail 3.0
1 EDB exploit
755
VMScore
CVE-2005-3314
Stack-based buffer overflow in the IMAP daemon in Novell Netmail 3.5.2 allows remote malicious users to execute arbitrary code via "long verb arguments."
Novell Netmail 3.5.2
1 EDB exploit
755
VMScore
CVE-2005-2661
Format string vulnerability in the ParseBannerAndCapability function in main.c for up-imapproxy 1.2.3 and 1.2.4 allows remote IMAP servers to execute arbitrary code via format string specifiers in a banner or capability line.
Up-imapproxy Up-imapproxy 1.2.3
Up-imapproxy Up-imapproxy 1.2.4
1 EDB exploit
755
VMScore
CVE-2005-1523
Format string vulnerability in imap4d server in GNU Mailutils 0.5 and 0.6, and other versions prior to 0.6.90, allows remote malicious users to execute arbitrary code via format string specifiers in the command tag for IMAP commands.
Gnu Mailutils 0.5
Gnu Mailutils 0.6
1 EDB exploit
755
VMScore
CVE-2004-2501
Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote malicious users to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection.
Mailenable Mailenable Enterprise 1.01
Mailenable Mailenable Professional 1.52
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »