Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mercur vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2000-0318
Atrium Mercur Mail Server 3.2 allows local malicious users to read other user's email and create arbitrary files via a dot dot (..) attack.
Atrium Software Mercur Mailserver 3.2
10
CVSSv2
CVE-2007-1578
Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote malicious users to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow.
Atrium Software Mercur Imapd 5.00.14
1 EDB exploit
7.8
CVSSv2
CVE-2006-7038
Multiple buffer overflows in MERCUR Messaging 2005 before Service Pack 4 allow remote malicious users to cause a denial of service (crash) via (1) "long command lines at port 32000" and (2) certain name service queries that are not properly handled by the SMTP service.
Atrium Software Mercur Messaging 2005 5.0 Sp3
7.8
CVSSv2
CVE-2006-7040
Unspecified vulnerability in MERCUR Messaging 2005 before Service Pack 4 allows remote malicious users to cause a denial of service (crash) via a TOP command to the POP3 service.
Atrium Software Mercur Messaging 2005 5.0 Sp3
7.8
CVSSv2
CVE-2006-7041
The SMTP service in MERCUR Messaging 2005 before Service Pack 4 allows remote malicious users to cause a denial of service (infinite loop) via a message in which neither the originator nor recipient address is known.
Atrium Software Mercur Messaging 2005 5.0 Sp3
5
CVSSv2
CVE-2006-7039
The IMAP4 service in MERCUR Messaging 2005 before Service Pack 4 allows remote malicious users to cause a denial of service (crash) via a message with a long subject field.
Atrium Software Mercur Messaging 2005 5.0 Sp3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2