Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mailenable mailenable enterprise 2.32 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2006-6239
webadmin in MailEnable NetWebAdmin Professional 2.32 and Enterprise 2.32 allows remote malicious users to authenticate using an empty password.
Mailenable Netwebadmin Enterprise 2.32
Mailenable Netwebadmin Professional 2.32
1000
VMScore
CVE-2006-6423
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 up to and including 2.35, Professional Edition 1.6 up to and including 1.84, and Enterprise Edition 1.1 up to and including 1.41 allows remote malicious users to execute arbitra...
Mailenable Mailenable Enterprise 1.16
Mailenable Mailenable Enterprise 1.17
Mailenable Mailenable Enterprise 1.24
Mailenable Mailenable Enterprise 1.25
Mailenable Mailenable Enterprise 1.32
Mailenable Mailenable Enterprise 1.33
Mailenable Mailenable Enterprise 1.41
Mailenable Mailenable Enterprise 2.35
Mailenable Mailenable Enterprise 1.13
Mailenable Mailenable Enterprise 1.14
Mailenable Mailenable Enterprise 1.15
Mailenable Mailenable Enterprise 1.22
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.30
Mailenable Mailenable Enterprise 1.31
Mailenable Mailenable Enterprise 1.39
Mailenable Mailenable Enterprise 1.40
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.12
Mailenable Mailenable Enterprise 1.2
Mailenable Mailenable Enterprise 1.21
Mailenable Mailenable Enterprise 1.28
3 EDB exploits
445
VMScore
CVE-2006-6484
The IMAP service for MailEnable Professional and Enterprise Edition 2.0 up to and including 2.34, Professional Edition 1.6 up to and including 1.83, and Enterprise Edition 1.1 up to and including 1.40 allows remote malicious users to cause a denial of service (crash) via unspecif...
Mailenable Mailenable Enterprise 1.13
Mailenable Mailenable Enterprise 1.14
Mailenable Mailenable Enterprise 1.22
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.30
Mailenable Mailenable Enterprise 1.31
Mailenable Mailenable Enterprise 1.38
Mailenable Mailenable Enterprise 1.39
Mailenable Mailenable Professional 1.6
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.12
Mailenable Mailenable Enterprise 1.2
Mailenable Mailenable Enterprise 1.21
Mailenable Mailenable Enterprise 1.28
Mailenable Mailenable Enterprise 1.29
Mailenable Mailenable Enterprise 1.36
Mailenable Mailenable Enterprise 1.37
Mailenable Mailenable Enterprise 2.33
Mailenable Mailenable Enterprise 2.34
Mailenable Mailenable Enterprise 1.1
Mailenable Mailenable Enterprise 1.17
Mailenable Mailenable Enterprise 1.18
578
VMScore
CVE-2006-6290
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 up to and including 1.82 and 2.0 up to and including 2.33, and MailEnable Enterprise 1.1 up to and including 1.30 and 2.0 up to and including 2.33 allow remote authenticated user...
Mailenable Mailenable Enterprise 1.11
Mailenable Mailenable Enterprise 1.12
Mailenable Mailenable Enterprise 1.19
Mailenable Mailenable Enterprise 1.2
Mailenable Mailenable Enterprise 1.27
Mailenable Mailenable Enterprise 1.28
Mailenable Mailenable Enterprise 1.29
Mailenable Mailenable Enterprise 2.06
Mailenable Mailenable Enterprise 2.07
Mailenable Mailenable Enterprise 2.14
Mailenable Mailenable Enterprise 2.15
Mailenable Mailenable Enterprise 2.23
Mailenable Mailenable Enterprise 2.24
Mailenable Mailenable Enterprise 2.31
Mailenable Mailenable Enterprise 2.32
Mailenable Mailenable Enterprise 1.15
Mailenable Mailenable Enterprise 1.16
Mailenable Mailenable Enterprise 1.23
Mailenable Mailenable Enterprise 1.24
Mailenable Mailenable Enterprise 2.01
Mailenable Mailenable Enterprise 2.03
Mailenable Mailenable Enterprise 2.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started