Search criteria

66 vulnerabilities found for kerio_mailserver by kerio

FKIE_CVE-2011-1506

Vulnerability from fkie_nvd - Published: 2011-03-22 17:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The STARTTLS implementation in Kerio Connect 7.1.4 build 2985 and MailServer 6.x does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. NOTE: some of these details are obtained from third party information.
Impacted products
Vendor Product Version
kerio connect 7.1.4
kerio kerio_mailserver 5.0
kerio kerio_mailserver 5.1
kerio kerio_mailserver 5.1.1
kerio kerio_mailserver 5.6.3
kerio kerio_mailserver 5.6.4
kerio kerio_mailserver 5.6.5
kerio kerio_mailserver 5.7.0
kerio kerio_mailserver 5.7.1
kerio kerio_mailserver 5.7.2
kerio kerio_mailserver 5.7.3
kerio kerio_mailserver 5.7.4
kerio kerio_mailserver 5.7.5
kerio kerio_mailserver 5.7.6
kerio kerio_mailserver 5.7.7
kerio kerio_mailserver 5.7.8
kerio kerio_mailserver 5.7.9
kerio kerio_mailserver 5.7.10
kerio kerio_mailserver 6.0
kerio kerio_mailserver 6.0.0
kerio kerio_mailserver 6.0.1
kerio kerio_mailserver 6.0.2
kerio kerio_mailserver 6.0.3
kerio kerio_mailserver 6.0.4
kerio kerio_mailserver 6.0.5
kerio kerio_mailserver 6.0.6
kerio kerio_mailserver 6.0.7
kerio kerio_mailserver 6.0.8
kerio kerio_mailserver 6.0.9
kerio kerio_mailserver 6.0.10
kerio kerio_mailserver 6.1.1
kerio kerio_mailserver 6.1.2
kerio kerio_mailserver 6.1.3
kerio kerio_mailserver 6.1.3_patch_1
kerio kerio_mailserver 6.1.4
kerio kerio_mailserver 6.2.0
kerio kerio_mailserver 6.2.1
kerio kerio_mailserver 6.2.2
kerio kerio_mailserver 6.3.0
kerio kerio_mailserver 6.3.1
kerio kerio_mailserver 6.3.1_p1
kerio kerio_mailserver 6.3.1_p2
kerio kerio_mailserver 6.4.0
kerio kerio_mailserver 6.4.1
kerio kerio_mailserver 6.4.2
kerio kerio_mailserver 6.5.0
kerio kerio_mailserver 6.5.0
kerio kerio_mailserver 6.5.1
kerio kerio_mailserver 6.5.2
kerio kerio_mailserver 6.6.0
kerio kerio_mailserver 6.6.0
kerio kerio_mailserver 6.6.1
kerio kerio_mailserver 6.6.2
kerio kerio_mailserver 6.7.0
kerio kerio_mailserver 6.7.1
kerio kerio_mailserver 6.7.2
kerio kerio_mailserver 6.7.3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kerio:connect:7.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5E56E9A-B68C-4E87-8CBF-73AD60794AAC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7D26DCD-85B0-4908-A414-119862437C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B58BAF1-CF68-4F8C-8BCD-FF3C015FE72A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9C9084-B518-44F2-9F65-032A644FEC61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F55CFA68-E07E-46CE-87F6-00AE9A268CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "58ECCE69-EAB9-427E-8922-F463E184C9F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20E50A0F-7AFF-4F17-8833-839DDBD538C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9063B23B-E585-41E4-98FF-DF18602C6E6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB993B9-0CF5-4E71-A612-F3033F4F202B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B079207-FAF3-4FE2-B420-342440958C48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A82C0BC-50D5-4FAC-A654-387B49CB7047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC1748E-32F0-4144-A597-89E8B8705FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "39C92F3B-23E3-4978-89AA-FC17B8EDF580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1FA201-CBCF-4D61-9848-F661A16EBEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A2154DF-2306-4E8B-B78A-1BF20E697157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C4389A-4BF4-4C38-8FF5-72B92548EFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "67230E76-2C30-4038-BC5B-BAC02EDDFAC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAEA1EB3-5F4F-40D6-833C-225AC348760D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC515E75-119E-4CB9-985E-00E6A9349178",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA7CEE3-7D36-4F9D-8AC6-3F4C55D360CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "937A6092-48C9-4721-B069-0B46D3520E36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38A0AAC-ACA8-44D3-B36A-741D01BE166F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "08AE0CAA-B5A4-4E3A-B997-A2858E88CCC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AC0D46-2096-4006-8FED-A67AFCE2ED98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F931B5E-6F02-48F6-8DAB-C0D796DFC2A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B391EF70-D407-4087-96CF-B925CA2799B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D64B85-51A2-47BC-94A2-8C9980CC573D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4AB197E-4F2E-4976-B6F7-17EB8A8BFBB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A8ADC9C-F49D-4CD2-B6DC-63552480646F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "991FC66F-B9F7-4E67-9D90-E56DE26FD85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F343A3A1-1335-4785-B90E-3C62736A06B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5605CD2B-8607-446C-94C4-B539C2396FEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B88E6A90-0433-493B-9E68-D0809F8A7B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.3_patch_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "402EE4C7-77D0-4C06-8407-9F69F4059890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "59830366-4CE8-44A2-9761-FB9226414A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E119E7EB-F7FE-451E-8E7C-BBAB3849DF50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B080E7F-7BA8-48A1-B0EC-16B3BE5B183F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A75F2BE-8D1A-4022-823E-16BA42DA02DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF86DC55-8519-44D5-A7FD-77FA8B2651AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAC7A299-CD9D-4159-A6C5-40F72DA158B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.3.1_p1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D02EC9-EF7F-4EBF-A053-1AE7DE164C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.3.1_p2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AE229C4-559F-4BB9-AF47-54C43AD03587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "45649E00-F6B4-4782-A989-D9D5E20FA75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "178E27A1-7A68-4298-96D8-540E0E77CDAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F30234CC-D865-4F1D-A4C7-FE6D050D2158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "312EC630-9D21-4560-A57D-77D1704942C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.5.0:patch_1:*:*:*:*:*:*",
              "matchCriteriaId": "4522E3BF-C7DC-4160-8841-7784C4C575BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB7D282B-ED68-45EB-912E-72F9E85DC23E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "609DCDF8-437A-49B1-95FB-5E0ED30E0711",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CD16F9A-6CC4-4FB2-9441-768312DEBB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.6.0:patch_1:*:*:*:*:*:*",
              "matchCriteriaId": "FE8D55BD-7C1A-455C-8243-01632C0438F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "64099B8F-F609-49D8-932E-8F4040AFFC75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FECD4F-3494-4EB7-A3AF-828E3D6DD5E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A59B047-22D1-4271-AA18-160536A1235F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4106DB61-421B-4F41-8D65-23FE4B6696E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FEA2AB8-AFB6-4AB2-B358-BD76CDD6B9B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "521CB164-8072-46CB-994E-6BC99863AB59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The STARTTLS implementation in Kerio Connect 7.1.4 build 2985 and MailServer 6.x does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a \"plaintext command injection\" attack, a similar issue to CVE-2011-0411.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n STARTTLS en Kerio Connect v7.1.4 build 2985 y MailServer v6.x no restringe de forma adecuada el b\u00fafer I/O, lo  que permite atacantes \"man-in-the-middle\" insertar comandos en las sesiones SMTP cifrado mediante el env\u00edo de un comando de texto plano que se procesa despu\u00e9s de TLS en su lugar, en relaci\u00f3n con un ataque \"inyecci\u00f3n de comandos de texto claro\", un problema similar a CVE-2011-0411.  NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2011-1506",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-03-22T17:55:04.377",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43678"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/555316"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8D9M4P"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/46767"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0610"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43678"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/555316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/MAPG-8D9M4P"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46767"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0610"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65932"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-2636

Vulnerability from fkie_nvd - Published: 2009-07-28 19:30 - Updated: 2025-04-09 00:30

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CD16F9A-6CC4-4FB2-9441-768312DEBB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "64099B8F-F609-49D8-932E-8F4040AFFC75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FECD4F-3494-4EB7-A3AF-828E3D6DD5E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A59B047-22D1-4271-AA18-160536A1235F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Integration page in the WebMail component in Kerio MailServer 6.6.0, 6.6.1, 6.6.2, and 6.7.0 allows remote attackers to inject arbitrary web script or HTML via an e-mail message."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en la p\u00e1gina Integration en el componente WebMail en Kerio MailServer v6.6.0, v6.6.1, v6.6.2, y v6.7.0  permite a atacantes remotos inyectar secuencias de comandos web o HTML de forma arbitraria a trav\u00e9s de un mensaje de correo electr\u00f3nico."
    }
  ],
  "id": "CVE-2009-2636",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-07-28T19:30:00.280",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/54928"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35392"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.kerio.com/support/security-advisories#0906"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/35264"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securitytracker.com/id?1022348"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/54928"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35392"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.kerio.com/support/security-advisories#0906"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/35264"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securitytracker.com/id?1022348"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-5769

Vulnerability from fkie_nvd - Published: 2008-12-30 20:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Kerio MailServer before 6.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) folder parameter to mailCompose.php or the (2) daytime parameter to calendarEdit.php. NOTE: some of these details are obtained from third party information.
Impacted products
Vendor Product Version
kerio kerio_mailserver *
kerio kerio_mailserver 5.0
kerio kerio_mailserver 5.1
kerio kerio_mailserver 5.1.1
kerio kerio_mailserver 5.6.3
kerio kerio_mailserver 5.6.4
kerio kerio_mailserver 5.6.5
kerio kerio_mailserver 5.7.0
kerio kerio_mailserver 5.7.1
kerio kerio_mailserver 5.7.2
kerio kerio_mailserver 5.7.3
kerio kerio_mailserver 5.7.4
kerio kerio_mailserver 5.7.5
kerio kerio_mailserver 5.7.6
kerio kerio_mailserver 5.7.7
kerio kerio_mailserver 5.7.8
kerio kerio_mailserver 5.7.9
kerio kerio_mailserver 5.7.10
kerio kerio_mailserver 6.0
kerio kerio_mailserver 6.0.0
kerio kerio_mailserver 6.0.1
kerio kerio_mailserver 6.0.2
kerio kerio_mailserver 6.0.3
kerio kerio_mailserver 6.0.4
kerio kerio_mailserver 6.0.5
kerio kerio_mailserver 6.0.6
kerio kerio_mailserver 6.0.7
kerio kerio_mailserver 6.0.8
kerio kerio_mailserver 6.0.9
kerio kerio_mailserver 6.0.10
kerio kerio_mailserver 6.1.1
kerio kerio_mailserver 6.1.2
kerio kerio_mailserver 6.1.3
kerio kerio_mailserver 6.1.3_patch_1
kerio kerio_mailserver 6.1.4
kerio kerio_mailserver 6.2.0
kerio kerio_mailserver 6.2.1
kerio kerio_mailserver 6.2.2
kerio kerio_mailserver 6.3.0
kerio kerio_mailserver 6.3.1
kerio kerio_mailserver 6.3.1_p1
kerio kerio_mailserver 6.3.1_p2
kerio kerio_mailserver 6.4.0
kerio kerio_mailserver 6.4.1
kerio kerio_mailserver 6.4.2
kerio kerio_mailserver 6.5.0
kerio kerio_mailserver 6.5.0
kerio kerio_mailserver 6.5.1
kerio kerio_mailserver 6.5.2
kerio kerio_mailserver 6.6.0
kerio kerio_mailserver 6.6.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07939A85-795C-4DEC-A63F-B2A468888EB2",
              "versionEndIncluding": "6.6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7D26DCD-85B0-4908-A414-119862437C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B58BAF1-CF68-4F8C-8BCD-FF3C015FE72A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9C9084-B518-44F2-9F65-032A644FEC61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F55CFA68-E07E-46CE-87F6-00AE9A268CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "58ECCE69-EAB9-427E-8922-F463E184C9F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20E50A0F-7AFF-4F17-8833-839DDBD538C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9063B23B-E585-41E4-98FF-DF18602C6E6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB993B9-0CF5-4E71-A612-F3033F4F202B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B079207-FAF3-4FE2-B420-342440958C48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A82C0BC-50D5-4FAC-A654-387B49CB7047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC1748E-32F0-4144-A597-89E8B8705FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "39C92F3B-23E3-4978-89AA-FC17B8EDF580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1FA201-CBCF-4D61-9848-F661A16EBEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A2154DF-2306-4E8B-B78A-1BF20E697157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C4389A-4BF4-4C38-8FF5-72B92548EFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "67230E76-2C30-4038-BC5B-BAC02EDDFAC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAEA1EB3-5F4F-40D6-833C-225AC348760D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC515E75-119E-4CB9-985E-00E6A9349178",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA7CEE3-7D36-4F9D-8AC6-3F4C55D360CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "937A6092-48C9-4721-B069-0B46D3520E36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38A0AAC-ACA8-44D3-B36A-741D01BE166F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "08AE0CAA-B5A4-4E3A-B997-A2858E88CCC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AC0D46-2096-4006-8FED-A67AFCE2ED98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F931B5E-6F02-48F6-8DAB-C0D796DFC2A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B391EF70-D407-4087-96CF-B925CA2799B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D64B85-51A2-47BC-94A2-8C9980CC573D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4AB197E-4F2E-4976-B6F7-17EB8A8BFBB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A8ADC9C-F49D-4CD2-B6DC-63552480646F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "991FC66F-B9F7-4E67-9D90-E56DE26FD85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F343A3A1-1335-4785-B90E-3C62736A06B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5605CD2B-8607-446C-94C4-B539C2396FEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B88E6A90-0433-493B-9E68-D0809F8A7B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.3_patch_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "402EE4C7-77D0-4C06-8407-9F69F4059890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "59830366-4CE8-44A2-9761-FB9226414A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E119E7EB-F7FE-451E-8E7C-BBAB3849DF50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B080E7F-7BA8-48A1-B0EC-16B3BE5B183F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A75F2BE-8D1A-4022-823E-16BA42DA02DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF86DC55-8519-44D5-A7FD-77FA8B2651AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAC7A299-CD9D-4159-A6C5-40F72DA158B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.3.1_p1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D02EC9-EF7F-4EBF-A053-1AE7DE164C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.3.1_p2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AE229C4-559F-4BB9-AF47-54C43AD03587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "45649E00-F6B4-4782-A989-D9D5E20FA75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "178E27A1-7A68-4298-96D8-540E0E77CDAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F30234CC-D865-4F1D-A4C7-FE6D050D2158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "312EC630-9D21-4560-A57D-77D1704942C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.5.0:patch_1:*:*:*:*:*:*",
              "matchCriteriaId": "4522E3BF-C7DC-4160-8841-7784C4C575BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB7D282B-ED68-45EB-912E-72F9E85DC23E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "609DCDF8-437A-49B1-95FB-5E0ED30E0711",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CD16F9A-6CC4-4FB2-9441-768312DEBB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.6.0:patch_1:*:*:*:*:*:*",
              "matchCriteriaId": "FE8D55BD-7C1A-455C-8243-01632C0438F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in Kerio MailServer before 6.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) folder parameter to mailCompose.php or the (2) daytime parameter to calendarEdit.php.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Kerio MailServer anterior a v6.6.2, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de los par\u00e1metros (1) \"folder\" a mailCompose.php o (2) \"daytime\" a calendarEdit.php. NOTA: algunos de estos detalles han sido obtenidos a partir de terceros."
    }
  ],
  "id": "CVE-2008-5769",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-12-30T20:30:01.717",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32955"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.kerio.com/security_advisory.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/32863"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/3442"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47397"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32955"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.kerio.com/security_advisory.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/32863"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/3442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47397"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-5760

Vulnerability from fkie_nvd - Published: 2008-12-30 19:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in error413.php in Kerio MailServer before 6.6.2 allows remote attackers to inject arbitrary web script or HTML via the sent parameter. NOTE: some of these details are obtained from third party information.
Impacted products
Vendor Product Version
kerio kerio_mailserver *
kerio kerio_mailserver 5.0
kerio kerio_mailserver 5.1
kerio kerio_mailserver 5.1.1
kerio kerio_mailserver 5.6.3
kerio kerio_mailserver 5.6.4
kerio kerio_mailserver 5.6.5
kerio kerio_mailserver 5.7.0
kerio kerio_mailserver 5.7.1
kerio kerio_mailserver 5.7.2
kerio kerio_mailserver 5.7.3
kerio kerio_mailserver 5.7.4
kerio kerio_mailserver 5.7.5
kerio kerio_mailserver 5.7.6
kerio kerio_mailserver 5.7.7
kerio kerio_mailserver 5.7.8
kerio kerio_mailserver 5.7.9
kerio kerio_mailserver 5.7.10
kerio kerio_mailserver 6.0
kerio kerio_mailserver 6.0.0
kerio kerio_mailserver 6.0.1
kerio kerio_mailserver 6.0.2
kerio kerio_mailserver 6.0.3
kerio kerio_mailserver 6.0.4
kerio kerio_mailserver 6.0.5
kerio kerio_mailserver 6.0.6
kerio kerio_mailserver 6.0.7
kerio kerio_mailserver 6.0.8
kerio kerio_mailserver 6.0.9
kerio kerio_mailserver 6.0.10
kerio kerio_mailserver 6.1.1
kerio kerio_mailserver 6.1.2
kerio kerio_mailserver 6.1.3
kerio kerio_mailserver 6.1.3_patch_1
kerio kerio_mailserver 6.1.4
kerio kerio_mailserver 6.2.0
kerio kerio_mailserver 6.2.1
kerio kerio_mailserver 6.2.2
kerio kerio_mailserver 6.3.0
kerio kerio_mailserver 6.3.1
kerio kerio_mailserver 6.3.1_p1
kerio kerio_mailserver 6.3.1_p2
kerio kerio_mailserver 6.4.0
kerio kerio_mailserver 6.4.1
kerio kerio_mailserver 6.4.2
kerio kerio_mailserver 6.5.0
kerio kerio_mailserver 6.5.0
kerio kerio_mailserver 6.5.1
kerio kerio_mailserver 6.5.2
kerio kerio_mailserver 6.6.0
kerio kerio_mailserver 6.6.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07939A85-795C-4DEC-A63F-B2A468888EB2",
              "versionEndIncluding": "6.6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7D26DCD-85B0-4908-A414-119862437C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B58BAF1-CF68-4F8C-8BCD-FF3C015FE72A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9C9084-B518-44F2-9F65-032A644FEC61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F55CFA68-E07E-46CE-87F6-00AE9A268CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "58ECCE69-EAB9-427E-8922-F463E184C9F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20E50A0F-7AFF-4F17-8833-839DDBD538C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9063B23B-E585-41E4-98FF-DF18602C6E6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB993B9-0CF5-4E71-A612-F3033F4F202B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B079207-FAF3-4FE2-B420-342440958C48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A82C0BC-50D5-4FAC-A654-387B49CB7047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC1748E-32F0-4144-A597-89E8B8705FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "39C92F3B-23E3-4978-89AA-FC17B8EDF580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1FA201-CBCF-4D61-9848-F661A16EBEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A2154DF-2306-4E8B-B78A-1BF20E697157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C4389A-4BF4-4C38-8FF5-72B92548EFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "67230E76-2C30-4038-BC5B-BAC02EDDFAC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAEA1EB3-5F4F-40D6-833C-225AC348760D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC515E75-119E-4CB9-985E-00E6A9349178",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA7CEE3-7D36-4F9D-8AC6-3F4C55D360CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "937A6092-48C9-4721-B069-0B46D3520E36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38A0AAC-ACA8-44D3-B36A-741D01BE166F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "08AE0CAA-B5A4-4E3A-B997-A2858E88CCC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AC0D46-2096-4006-8FED-A67AFCE2ED98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F931B5E-6F02-48F6-8DAB-C0D796DFC2A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B391EF70-D407-4087-96CF-B925CA2799B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D64B85-51A2-47BC-94A2-8C9980CC573D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4AB197E-4F2E-4976-B6F7-17EB8A8BFBB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A8ADC9C-F49D-4CD2-B6DC-63552480646F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "991FC66F-B9F7-4E67-9D90-E56DE26FD85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F343A3A1-1335-4785-B90E-3C62736A06B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5605CD2B-8607-446C-94C4-B539C2396FEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B88E6A90-0433-493B-9E68-D0809F8A7B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.3_patch_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "402EE4C7-77D0-4C06-8407-9F69F4059890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "59830366-4CE8-44A2-9761-FB9226414A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E119E7EB-F7FE-451E-8E7C-BBAB3849DF50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B080E7F-7BA8-48A1-B0EC-16B3BE5B183F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A75F2BE-8D1A-4022-823E-16BA42DA02DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF86DC55-8519-44D5-A7FD-77FA8B2651AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAC7A299-CD9D-4159-A6C5-40F72DA158B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.3.1_p1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83D02EC9-EF7F-4EBF-A053-1AE7DE164C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.3.1_p2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AE229C4-559F-4BB9-AF47-54C43AD03587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "45649E00-F6B4-4782-A989-D9D5E20FA75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "178E27A1-7A68-4298-96D8-540E0E77CDAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F30234CC-D865-4F1D-A4C7-FE6D050D2158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "312EC630-9D21-4560-A57D-77D1704942C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.5.0:patch_1:*:*:*:*:*:*",
              "matchCriteriaId": "4522E3BF-C7DC-4160-8841-7784C4C575BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB7D282B-ED68-45EB-912E-72F9E85DC23E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "609DCDF8-437A-49B1-95FB-5E0ED30E0711",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CD16F9A-6CC4-4FB2-9441-768312DEBB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.6.0:patch_1:*:*:*:*:*:*",
              "matchCriteriaId": "FE8D55BD-7C1A-455C-8243-01632C0438F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in error413.php in Kerio MailServer before 6.6.2 allows remote attackers to inject arbitrary web script or HTML via the sent parameter.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en error413.php en Kerio MailServer anterior a v6.6.2, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s del par\u00e1metro \"sent\". NOTA: algunos de estos detalles han sido obtenidos a a partir de informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2008-5760",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-12-30T19:30:00.453",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32955"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.kerio.com/security_advisory.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/32863"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/3442"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32955"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.kerio.com/security_advisory.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/32863"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/3442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47398"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-0859

Vulnerability from fkie_nvd - Published: 2008-02-21 00:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Kerio MailServer before 6.5.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors related to decoding of uuencoded input, which triggers memory corruption.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7D26DCD-85B0-4908-A414-119862437C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B58BAF1-CF68-4F8C-8BCD-FF3C015FE72A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9C9084-B518-44F2-9F65-032A644FEC61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F55CFA68-E07E-46CE-87F6-00AE9A268CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "58ECCE69-EAB9-427E-8922-F463E184C9F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20E50A0F-7AFF-4F17-8833-839DDBD538C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9063B23B-E585-41E4-98FF-DF18602C6E6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB993B9-0CF5-4E71-A612-F3033F4F202B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B079207-FAF3-4FE2-B420-342440958C48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A82C0BC-50D5-4FAC-A654-387B49CB7047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC1748E-32F0-4144-A597-89E8B8705FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "39C92F3B-23E3-4978-89AA-FC17B8EDF580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1FA201-CBCF-4D61-9848-F661A16EBEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A2154DF-2306-4E8B-B78A-1BF20E697157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C4389A-4BF4-4C38-8FF5-72B92548EFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "67230E76-2C30-4038-BC5B-BAC02EDDFAC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAEA1EB3-5F4F-40D6-833C-225AC348760D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC515E75-119E-4CB9-985E-00E6A9349178",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "937A6092-48C9-4721-B069-0B46D3520E36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38A0AAC-ACA8-44D3-B36A-741D01BE166F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "08AE0CAA-B5A4-4E3A-B997-A2858E88CCC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AC0D46-2096-4006-8FED-A67AFCE2ED98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A8ADC9C-F49D-4CD2-B6DC-63552480646F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "991FC66F-B9F7-4E67-9D90-E56DE26FD85F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B88E6A90-0433-493B-9E68-D0809F8A7B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A75F2BE-8D1A-4022-823E-16BA42DA02DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAC7A299-CD9D-4159-A6C5-40F72DA158B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "45649E00-F6B4-4782-A989-D9D5E20FA75B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "178E27A1-7A68-4298-96D8-540E0E77CDAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F30234CC-D865-4F1D-A4C7-FE6D050D2158",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Kerio MailServer before 6.5.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors related to decoding of uuencoded input, which triggers memory corruption."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad sin especificar en Kerio MailServer vesiones anteriores a 6.5.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de vectores no especificados relacionados con la decodificaci\u00f3n de una entrada UUencoded, lo cual dispara una corrupci\u00f3n de memoria."
    }
  ],
  "id": "CVE-2008-0859",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-02-21T00:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29021"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/27868"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019428"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0594"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27868"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0594"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        },
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-0860

Vulnerability from fkie_nvd - Published: 2008-02-21 00:44 - Updated: 2025-04-09 00:30

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kerio:avg_plugin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "935F6D7F-5AE2-4429-B510-3BA881444F04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58A0E98-988A-470B-9B1D-F0AE1743ED8C",
              "versionEndIncluding": "6.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the AVG plugin in Kerio MailServer before 6.5.0 has unspecified impact via unknown remote attack vectors related to null DACLs."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el Plugin AVG en Kerio MailServer anterior 6.5.0, tiene un impacto no especificado a trav\u00e9s de vetores de ataque remotos relacionados con las DACLs vac\u00edas."
    }
  ],
  "id": "CVE-2008-0860",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-02-21T00:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29021"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/27868"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019428"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0594"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27868"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0594"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-0858

Vulnerability from fkie_nvd - Published: 2008-02-21 00:44 - Updated: 2025-04-09 00:30

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58A0E98-988A-470B-9B1D-F0AE1743ED8C",
              "versionEndIncluding": "6.4.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:visnetic:visnetic_antivirus_plug-in_for_mail_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3C16C34-2AF7-436D-9E2E-60FD50147799",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the Visnetic anti-virus plugin in Kerio MailServer before 6.5.0 might allow remote attackers to execute arbitrary code via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de desbordamiento de b\u00fafer en el Plugin Visnetic anti-virus en Kerio MailServer anterior a la v6.5.0, podr\u00eda permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2008-0858",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-02-21T00:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29021"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/27868"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019428"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0594"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27868"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0594"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-3993

Vulnerability from fkie_nvd - Published: 2007-07-25 18:30 - Updated: 2025-04-09 00:30

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE77C14-88FB-4E3C-A20B-F1049116D182",
              "versionEndIncluding": "6.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the attachment filter in Kerio MailServer before 6.4.1 has unknown impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el filtro de adjuntos en Kerio MailServer anterior 6.4.1 tiene un impacto desconocido y vectores de ataque remotos."
    }
  ],
  "evaluatorComment": "http://www.frsirt.com/english/advisories/2007/2637",
  "evaluatorSolution": "Vendor has released an upgrade to fix vulnerability: http://www.kerio.com/kms_download.html",
  "id": "CVE-2007-3993",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-07-25T18:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/38571"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26185"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/25038"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018453"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2637"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35618"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/38571"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/25038"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018453"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35618"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-6554

Vulnerability from fkie_nvd - Published: 2006-12-14 18:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Kerio MailServer before 6.3.1 allows remote attackers to cause a denial of service (segmentation fault and service stop) via certain long LDAP queries, as demonstrated by vd_kms6.pm.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D179F96-89B2-4C2F-AD10-0BF6EF41F78A",
              "versionEndIncluding": "6.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7D26DCD-85B0-4908-A414-119862437C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B58BAF1-CF68-4F8C-8BCD-FF3C015FE72A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9C9084-B518-44F2-9F65-032A644FEC61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F55CFA68-E07E-46CE-87F6-00AE9A268CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "58ECCE69-EAB9-427E-8922-F463E184C9F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20E50A0F-7AFF-4F17-8833-839DDBD538C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9063B23B-E585-41E4-98FF-DF18602C6E6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB993B9-0CF5-4E71-A612-F3033F4F202B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B079207-FAF3-4FE2-B420-342440958C48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A82C0BC-50D5-4FAC-A654-387B49CB7047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC1748E-32F0-4144-A597-89E8B8705FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "39C92F3B-23E3-4978-89AA-FC17B8EDF580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1FA201-CBCF-4D61-9848-F661A16EBEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A2154DF-2306-4E8B-B78A-1BF20E697157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C4389A-4BF4-4C38-8FF5-72B92548EFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "67230E76-2C30-4038-BC5B-BAC02EDDFAC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:5.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAEA1EB3-5F4F-40D6-833C-225AC348760D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC515E75-119E-4CB9-985E-00E6A9349178",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA7CEE3-7D36-4F9D-8AC6-3F4C55D360CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "937A6092-48C9-4721-B069-0B46D3520E36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38A0AAC-ACA8-44D3-B36A-741D01BE166F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "08AE0CAA-B5A4-4E3A-B997-A2858E88CCC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AC0D46-2096-4006-8FED-A67AFCE2ED98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F931B5E-6F02-48F6-8DAB-C0D796DFC2A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B391EF70-D407-4087-96CF-B925CA2799B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D64B85-51A2-47BC-94A2-8C9980CC573D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4AB197E-4F2E-4976-B6F7-17EB8A8BFBB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:6.1.3_patch_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "402EE4C7-77D0-4C06-8407-9F69F4059890",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Kerio MailServer before 6.3.1 allows remote attackers to cause a denial of service (segmentation fault and service stop) via certain long LDAP queries, as demonstrated by vd_kms6.pm."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en Kerio MailServer anteriores a 6.3.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n y parada de servicio) mediante ciertas consultas LDAP largas, como ha demostrado vd_kms6.pm."
    }
  ],
  "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nKerio, Kerio MailServer, 6.3.1",
  "id": "CVE-2006-6554",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-14T18:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23364"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/454455/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4993"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23364"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.kerio.com/kms_history.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/454455/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4993"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30872"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-5812

Vulnerability from fkie_nvd - Published: 2006-11-08 23:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Kerio MailServer allows attackers to cause a denial of service, as demonstrated by vd_kms4.pm, a "Kerio MailServer DoS." NOTE: As of 20061108, this disclosure has no actionable information. However, since it is from a reliable researcher, it is being assigned a CVE identifier for tracking purposes.
Impacted products
Vendor Product Version
kerio kerio_mailserver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kerio:kerio_mailserver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A65F0F8C-EB22-47C0-B184-B1AEB84E7140",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Kerio MailServer allows attackers to cause a denial of service, as demonstrated by vd_kms4.pm, a \"Kerio MailServer DoS.\" NOTE: As of 20061108, this disclosure has no actionable information. However, since it is from a reliable researcher, it is being assigned a CVE identifier for tracking purposes."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en Kerio MailServer permite a atacantes remotos provocar una denegaci\u00f3n de servicio, como ha sido demostrado por vd_kms4.pm, una \"Kerio MailServer DoS\". NOTA: A partir del 08/11/2006,  esta divulgaci\u00f3n no tiene informaci\u00f3n accionable. Sin embargo, ya que se trata de un investigador de confianza, est\u00e1 siendo asignado un identificador CVE para prop\u00f3sitos de seguimiento."
    }
  ],
  "id": "CVE-2006-5812",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-11-08T23:07:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://gleg.net/vulndisco_meta.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22861"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1017171"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://gleg.net/vulndisco_meta.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22861"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30145"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2011-1506 (GCVE-0-2011-1506)

Vulnerability from cvelistv5 – Published: 2011-03-22 17:00 – Updated: 2024-08-06 22:28
VLAI?
Summary
The STARTTLS implementation in Kerio Connect 7.1.4 build 2985 and MailServer 6.x does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.kb.cert.org/vuls/id/MAPG-8D9M4P x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.vupen.com/english/advisories/2011/0610 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/46767 vdb-entryx_refsource_BID
http://www.kb.cert.org/vuls/id/555316 third-party-advisoryx_refsource_CERT-VN
http://secunia.com/advisories/43678 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.777Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8D9M4P"
          },
          {
            "name": "multiple-starttls-command-execution(65932)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65932"
          },
          {
            "name": "ADV-2011-0610",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0610"
          },
          {
            "name": "46767",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46767"
          },
          {
            "name": "VU#555316",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/555316"
          },
          {
            "name": "43678",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43678"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The STARTTLS implementation in Kerio Connect 7.1.4 build 2985 and MailServer 6.x does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a \"plaintext command injection\" attack, a similar issue to CVE-2011-0411.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8D9M4P"
        },
        {
          "name": "multiple-starttls-command-execution(65932)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65932"
        },
        {
          "name": "ADV-2011-0610",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0610"
        },
        {
          "name": "46767",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46767"
        },
        {
          "name": "VU#555316",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/555316"
        },
        {
          "name": "43678",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43678"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1506",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The STARTTLS implementation in Kerio Connect 7.1.4 build 2985 and MailServer 6.x does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a \"plaintext command injection\" attack, a similar issue to CVE-2011-0411.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8D9M4P",
              "refsource": "CONFIRM",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8D9M4P"
            },
            {
              "name": "multiple-starttls-command-execution(65932)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65932"
            },
            {
              "name": "ADV-2011-0610",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0610"
            },
            {
              "name": "46767",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46767"
            },
            {
              "name": "VU#555316",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/555316"
            },
            {
              "name": "43678",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43678"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1506",
    "datePublished": "2011-03-22T17:00:00",
    "dateReserved": "2011-03-22T00:00:00",
    "dateUpdated": "2024-08-06T22:28:41.777Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2636 (GCVE-0-2009-2636)

Vulnerability from cvelistv5 – Published: 2009-07-28 19:06 – Updated: 2024-09-16 16:23
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the Integration page in the WebMail component in Kerio MailServer 6.6.0, 6.6.1, 6.6.2, and 6.7.0 allows remote attackers to inject arbitrary web script or HTML via an e-mail message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/35392 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/54928 vdb-entryx_refsource_OSVDB
http://www.kerio.com/support/security-advisories#0906 x_refsource_CONFIRM
http://www.securitytracker.com/id?1022348 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/35264 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:59:56.924Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "35392",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35392"
          },
          {
            "name": "54928",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/54928"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/support/security-advisories#0906"
          },
          {
            "name": "1022348",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022348"
          },
          {
            "name": "35264",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35264"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Integration page in the WebMail component in Kerio MailServer 6.6.0, 6.6.1, 6.6.2, and 6.7.0 allows remote attackers to inject arbitrary web script or HTML via an e-mail message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-07-28T19:06:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "35392",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35392"
        },
        {
          "name": "54928",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/54928"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/support/security-advisories#0906"
        },
        {
          "name": "1022348",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022348"
        },
        {
          "name": "35264",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35264"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2636",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Integration page in the WebMail component in Kerio MailServer 6.6.0, 6.6.1, 6.6.2, and 6.7.0 allows remote attackers to inject arbitrary web script or HTML via an e-mail message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "35392",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35392"
            },
            {
              "name": "54928",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/54928"
            },
            {
              "name": "http://www.kerio.com/support/security-advisories#0906",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/support/security-advisories#0906"
            },
            {
              "name": "1022348",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022348"
            },
            {
              "name": "35264",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35264"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2636",
    "datePublished": "2009-07-28T19:06:00Z",
    "dateReserved": "2009-07-28T00:00:00Z",
    "dateUpdated": "2024-09-16T16:23:55.229Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5769 (GCVE-0-2008-5769)

Vulnerability from cvelistv5 – Published: 2008-12-30 20:00 – Updated: 2024-08-07 11:04
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Kerio MailServer before 6.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) folder parameter to mailCompose.php or the (2) daytime parameter to calendarEdit.php. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:04:44.387Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "32863",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32863"
          },
          {
            "name": "32955",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32955"
          },
          {
            "name": "mailerserver-mailcompose-calendaredit-xss(47397)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47397"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/security_advisory.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          },
          {
            "name": "ADV-2008-3442",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3442"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in Kerio MailServer before 6.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) folder parameter to mailCompose.php or the (2) daytime parameter to calendarEdit.php.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "32863",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32863"
        },
        {
          "name": "32955",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32955"
        },
        {
          "name": "mailerserver-mailcompose-calendaredit-xss(47397)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47397"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/security_advisory.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        },
        {
          "name": "ADV-2008-3442",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3442"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5769",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in Kerio MailServer before 6.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) folder parameter to mailCompose.php or the (2) daytime parameter to calendarEdit.php.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "32863",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32863"
            },
            {
              "name": "32955",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32955"
            },
            {
              "name": "mailerserver-mailcompose-calendaredit-xss(47397)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47397"
            },
            {
              "name": "http://www.kerio.com/security_advisory.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/security_advisory.html"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            },
            {
              "name": "ADV-2008-3442",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3442"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5769",
    "datePublished": "2008-12-30T20:00:00",
    "dateReserved": "2008-12-30T00:00:00",
    "dateUpdated": "2024-08-07T11:04:44.387Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5760 (GCVE-0-2008-5760)

Vulnerability from cvelistv5 – Published: 2008-12-30 19:00 – Updated: 2024-08-07 11:04
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in error413.php in Kerio MailServer before 6.6.2 allows remote attackers to inject arbitrary web script or HTML via the sent parameter. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:04:44.550Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "32863",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32863"
          },
          {
            "name": "32955",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32955"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/security_advisory.html"
          },
          {
            "name": "mailserver-error413-xss(47398)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47398"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          },
          {
            "name": "ADV-2008-3442",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3442"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in error413.php in Kerio MailServer before 6.6.2 allows remote attackers to inject arbitrary web script or HTML via the sent parameter.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "32863",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32863"
        },
        {
          "name": "32955",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32955"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/security_advisory.html"
        },
        {
          "name": "mailserver-error413-xss(47398)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47398"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        },
        {
          "name": "ADV-2008-3442",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3442"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5760",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in error413.php in Kerio MailServer before 6.6.2 allows remote attackers to inject arbitrary web script or HTML via the sent parameter.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "32863",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32863"
            },
            {
              "name": "32955",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32955"
            },
            {
              "name": "http://www.kerio.com/security_advisory.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/security_advisory.html"
            },
            {
              "name": "mailserver-error413-xss(47398)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47398"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            },
            {
              "name": "ADV-2008-3442",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3442"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5760",
    "datePublished": "2008-12-30T19:00:00",
    "dateReserved": "2008-12-30T00:00:00",
    "dateUpdated": "2024-08-07T11:04:44.550Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0858 (GCVE-0-2008-0858)

Vulnerability from cvelistv5 – Published: 2008-02-21 00:00 – Updated: 2024-08-07 08:01
VLAI?
Summary
Buffer overflow in the Visnetic anti-virus plugin in Kerio MailServer before 6.5.0 might allow remote attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1019428 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/0594 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/29021 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/27868 vdb-entryx_refsource_BID
http://www.kerio.com/kms_history.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:01:40.066Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1019428",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019428"
          },
          {
            "name": "ADV-2008-0594",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0594"
          },
          {
            "name": "29021",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29021"
          },
          {
            "name": "27868",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27868"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the Visnetic anti-virus plugin in Kerio MailServer before 6.5.0 might allow remote attackers to execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1019428",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019428"
        },
        {
          "name": "ADV-2008-0594",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0594"
        },
        {
          "name": "29021",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29021"
        },
        {
          "name": "27868",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27868"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0858",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the Visnetic anti-virus plugin in Kerio MailServer before 6.5.0 might allow remote attackers to execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1019428",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019428"
            },
            {
              "name": "ADV-2008-0594",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0594"
            },
            {
              "name": "29021",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29021"
            },
            {
              "name": "27868",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27868"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0858",
    "datePublished": "2008-02-21T00:00:00",
    "dateReserved": "2008-02-20T00:00:00",
    "dateUpdated": "2024-08-07T08:01:40.066Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0859 (GCVE-0-2008-0859)

Vulnerability from cvelistv5 – Published: 2008-02-21 00:00 – Updated: 2024-08-07 08:01
VLAI?
Summary
Unspecified vulnerability in Kerio MailServer before 6.5.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors related to decoding of uuencoded input, which triggers memory corruption.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1019428 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/0594 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/29021 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/27868 vdb-entryx_refsource_BID
http://www.kerio.com/kms_history.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:01:39.847Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1019428",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019428"
          },
          {
            "name": "ADV-2008-0594",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0594"
          },
          {
            "name": "29021",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29021"
          },
          {
            "name": "27868",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27868"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Kerio MailServer before 6.5.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors related to decoding of uuencoded input, which triggers memory corruption."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1019428",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019428"
        },
        {
          "name": "ADV-2008-0594",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0594"
        },
        {
          "name": "29021",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29021"
        },
        {
          "name": "27868",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27868"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0859",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Kerio MailServer before 6.5.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors related to decoding of uuencoded input, which triggers memory corruption."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1019428",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019428"
            },
            {
              "name": "ADV-2008-0594",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0594"
            },
            {
              "name": "29021",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29021"
            },
            {
              "name": "27868",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27868"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0859",
    "datePublished": "2008-02-21T00:00:00",
    "dateReserved": "2008-02-20T00:00:00",
    "dateUpdated": "2024-08-07T08:01:39.847Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0860 (GCVE-0-2008-0860)

Vulnerability from cvelistv5 – Published: 2008-02-21 00:00 – Updated: 2024-08-07 08:01
VLAI?
Summary
Unspecified vulnerability in the AVG plugin in Kerio MailServer before 6.5.0 has unspecified impact via unknown remote attack vectors related to null DACLs.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1019428 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/0594 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/29021 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/27868 vdb-entryx_refsource_BID
http://www.kerio.com/kms_history.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:01:39.911Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1019428",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019428"
          },
          {
            "name": "ADV-2008-0594",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0594"
          },
          {
            "name": "29021",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29021"
          },
          {
            "name": "27868",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27868"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the AVG plugin in Kerio MailServer before 6.5.0 has unspecified impact via unknown remote attack vectors related to null DACLs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1019428",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019428"
        },
        {
          "name": "ADV-2008-0594",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0594"
        },
        {
          "name": "29021",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29021"
        },
        {
          "name": "27868",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27868"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0860",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the AVG plugin in Kerio MailServer before 6.5.0 has unspecified impact via unknown remote attack vectors related to null DACLs."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1019428",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019428"
            },
            {
              "name": "ADV-2008-0594",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0594"
            },
            {
              "name": "29021",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29021"
            },
            {
              "name": "27868",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27868"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0860",
    "datePublished": "2008-02-21T00:00:00",
    "dateReserved": "2008-02-20T00:00:00",
    "dateUpdated": "2024-08-07T08:01:39.911Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3993 (GCVE-0-2007-3993)

Vulnerability from cvelistv5 – Published: 2007-07-25 18:00 – Updated: 2024-08-07 14:37
VLAI?
Summary
Unspecified vulnerability in the attachment filter in Kerio MailServer before 6.4.1 has unknown impact and remote attack vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2007/2637 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/26185 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/25038 vdb-entryx_refsource_BID
http://osvdb.org/38571 vdb-entryx_refsource_OSVDB
http://www.kerio.com/kms_history.html x_refsource_CONFIRM
http://www.securitytracker.com/id?1018453 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:37:05.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2007-2637",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2637"
          },
          {
            "name": "26185",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26185"
          },
          {
            "name": "keriomailserver-filter-unspecified(35618)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35618"
          },
          {
            "name": "25038",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25038"
          },
          {
            "name": "38571",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/38571"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          },
          {
            "name": "1018453",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018453"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the attachment filter in Kerio MailServer before 6.4.1 has unknown impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2007-2637",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2637"
        },
        {
          "name": "26185",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26185"
        },
        {
          "name": "keriomailserver-filter-unspecified(35618)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35618"
        },
        {
          "name": "25038",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25038"
        },
        {
          "name": "38571",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/38571"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        },
        {
          "name": "1018453",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018453"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3993",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the attachment filter in Kerio MailServer before 6.4.1 has unknown impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2007-2637",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2637"
            },
            {
              "name": "26185",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26185"
            },
            {
              "name": "keriomailserver-filter-unspecified(35618)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35618"
            },
            {
              "name": "25038",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25038"
            },
            {
              "name": "38571",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/38571"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            },
            {
              "name": "1018453",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018453"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3993",
    "datePublished": "2007-07-25T18:00:00",
    "dateReserved": "2007-07-25T00:00:00",
    "dateUpdated": "2024-08-07T14:37:05.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6554 (GCVE-0-2006-6554)

Vulnerability from cvelistv5 – Published: 2006-12-14 18:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Unspecified vulnerability in Kerio MailServer before 6.3.1 allows remote attackers to cause a denial of service (segmentation fault and service stop) via certain long LDAP queries, as demonstrated by vd_kms6.pm.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:33:58.589Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "keriomailserver-ldap-dos(30872)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30872"
          },
          {
            "name": "23364",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23364"
          },
          {
            "name": "20061214 Kerio MailServer \u003c 6.3.1 remote Denial of Service",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/454455/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          },
          {
            "name": "ADV-2006-4993",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4993"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Kerio MailServer before 6.3.1 allows remote attackers to cause a denial of service (segmentation fault and service stop) via certain long LDAP queries, as demonstrated by vd_kms6.pm."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "keriomailserver-ldap-dos(30872)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30872"
        },
        {
          "name": "23364",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23364"
        },
        {
          "name": "20061214 Kerio MailServer \u003c 6.3.1 remote Denial of Service",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/454455/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        },
        {
          "name": "ADV-2006-4993",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4993"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6554",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Kerio MailServer before 6.3.1 allows remote attackers to cause a denial of service (segmentation fault and service stop) via certain long LDAP queries, as demonstrated by vd_kms6.pm."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "keriomailserver-ldap-dos(30872)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30872"
            },
            {
              "name": "23364",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23364"
            },
            {
              "name": "20061214 Kerio MailServer \u003c 6.3.1 remote Denial of Service",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/454455/100/0/threaded"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            },
            {
              "name": "ADV-2006-4993",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4993"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6554",
    "datePublished": "2006-12-14T18:00:00",
    "dateReserved": "2006-12-14T00:00:00",
    "dateUpdated": "2024-08-07T20:33:58.589Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5812 (GCVE-0-2006-5812)

Vulnerability from cvelistv5 – Published: 2006-11-08 23:00 – Updated: 2024-08-07 20:04
VLAI?
Summary
Unspecified vulnerability in Kerio MailServer allows attackers to cause a denial of service, as demonstrated by vd_kms4.pm, a "Kerio MailServer DoS." NOTE: As of 20061108, this disclosure has no actionable information. However, since it is from a reliable researcher, it is being assigned a CVE identifier for tracking purposes.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://gleg.net/vulndisco_meta.shtml x_refsource_MISC
http://secunia.com/advisories/22861 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1017171 vdb-entryx_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:04:55.670Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://gleg.net/vulndisco_meta.shtml"
          },
          {
            "name": "22861",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22861"
          },
          {
            "name": "1017171",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017171"
          },
          {
            "name": "kerio-mailserver-dos(30145)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30145"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Kerio MailServer allows attackers to cause a denial of service, as demonstrated by vd_kms4.pm, a \"Kerio MailServer DoS.\" NOTE: As of 20061108, this disclosure has no actionable information. However, since it is from a reliable researcher, it is being assigned a CVE identifier for tracking purposes."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://gleg.net/vulndisco_meta.shtml"
        },
        {
          "name": "22861",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22861"
        },
        {
          "name": "1017171",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017171"
        },
        {
          "name": "kerio-mailserver-dos(30145)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30145"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5812",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Kerio MailServer allows attackers to cause a denial of service, as demonstrated by vd_kms4.pm, a \"Kerio MailServer DoS.\" NOTE: As of 20061108, this disclosure has no actionable information. However, since it is from a reliable researcher, it is being assigned a CVE identifier for tracking purposes."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://gleg.net/vulndisco_meta.shtml",
              "refsource": "MISC",
              "url": "http://gleg.net/vulndisco_meta.shtml"
            },
            {
              "name": "22861",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22861"
            },
            {
              "name": "1017171",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017171"
            },
            {
              "name": "kerio-mailserver-dos(30145)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30145"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5812",
    "datePublished": "2006-11-08T23:00:00",
    "dateReserved": "2006-11-08T00:00:00",
    "dateUpdated": "2024-08-07T20:04:55.670Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1506 (GCVE-0-2011-1506)

Vulnerability from nvd – Published: 2011-03-22 17:00 – Updated: 2024-08-06 22:28
VLAI?
Summary
The STARTTLS implementation in Kerio Connect 7.1.4 build 2985 and MailServer 6.x does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.kb.cert.org/vuls/id/MAPG-8D9M4P x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.vupen.com/english/advisories/2011/0610 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/46767 vdb-entryx_refsource_BID
http://www.kb.cert.org/vuls/id/555316 third-party-advisoryx_refsource_CERT-VN
http://secunia.com/advisories/43678 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.777Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/MAPG-8D9M4P"
          },
          {
            "name": "multiple-starttls-command-execution(65932)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65932"
          },
          {
            "name": "ADV-2011-0610",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0610"
          },
          {
            "name": "46767",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46767"
          },
          {
            "name": "VU#555316",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/555316"
          },
          {
            "name": "43678",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43678"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The STARTTLS implementation in Kerio Connect 7.1.4 build 2985 and MailServer 6.x does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a \"plaintext command injection\" attack, a similar issue to CVE-2011-0411.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kb.cert.org/vuls/id/MAPG-8D9M4P"
        },
        {
          "name": "multiple-starttls-command-execution(65932)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65932"
        },
        {
          "name": "ADV-2011-0610",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0610"
        },
        {
          "name": "46767",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46767"
        },
        {
          "name": "VU#555316",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/555316"
        },
        {
          "name": "43678",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43678"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1506",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The STARTTLS implementation in Kerio Connect 7.1.4 build 2985 and MailServer 6.x does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a \"plaintext command injection\" attack, a similar issue to CVE-2011-0411.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.kb.cert.org/vuls/id/MAPG-8D9M4P",
              "refsource": "CONFIRM",
              "url": "http://www.kb.cert.org/vuls/id/MAPG-8D9M4P"
            },
            {
              "name": "multiple-starttls-command-execution(65932)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65932"
            },
            {
              "name": "ADV-2011-0610",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0610"
            },
            {
              "name": "46767",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46767"
            },
            {
              "name": "VU#555316",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/555316"
            },
            {
              "name": "43678",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43678"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1506",
    "datePublished": "2011-03-22T17:00:00",
    "dateReserved": "2011-03-22T00:00:00",
    "dateUpdated": "2024-08-06T22:28:41.777Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2636 (GCVE-0-2009-2636)

Vulnerability from nvd – Published: 2009-07-28 19:06 – Updated: 2024-09-16 16:23
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the Integration page in the WebMail component in Kerio MailServer 6.6.0, 6.6.1, 6.6.2, and 6.7.0 allows remote attackers to inject arbitrary web script or HTML via an e-mail message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/35392 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/54928 vdb-entryx_refsource_OSVDB
http://www.kerio.com/support/security-advisories#0906 x_refsource_CONFIRM
http://www.securitytracker.com/id?1022348 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/35264 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:59:56.924Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "35392",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35392"
          },
          {
            "name": "54928",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/54928"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/support/security-advisories#0906"
          },
          {
            "name": "1022348",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022348"
          },
          {
            "name": "35264",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35264"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Integration page in the WebMail component in Kerio MailServer 6.6.0, 6.6.1, 6.6.2, and 6.7.0 allows remote attackers to inject arbitrary web script or HTML via an e-mail message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-07-28T19:06:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "35392",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35392"
        },
        {
          "name": "54928",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/54928"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/support/security-advisories#0906"
        },
        {
          "name": "1022348",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022348"
        },
        {
          "name": "35264",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35264"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2636",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Integration page in the WebMail component in Kerio MailServer 6.6.0, 6.6.1, 6.6.2, and 6.7.0 allows remote attackers to inject arbitrary web script or HTML via an e-mail message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "35392",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35392"
            },
            {
              "name": "54928",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/54928"
            },
            {
              "name": "http://www.kerio.com/support/security-advisories#0906",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/support/security-advisories#0906"
            },
            {
              "name": "1022348",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022348"
            },
            {
              "name": "35264",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35264"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2636",
    "datePublished": "2009-07-28T19:06:00Z",
    "dateReserved": "2009-07-28T00:00:00Z",
    "dateUpdated": "2024-09-16T16:23:55.229Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5769 (GCVE-0-2008-5769)

Vulnerability from nvd – Published: 2008-12-30 20:00 – Updated: 2024-08-07 11:04
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Kerio MailServer before 6.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) folder parameter to mailCompose.php or the (2) daytime parameter to calendarEdit.php. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:04:44.387Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "32863",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32863"
          },
          {
            "name": "32955",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32955"
          },
          {
            "name": "mailerserver-mailcompose-calendaredit-xss(47397)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47397"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/security_advisory.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          },
          {
            "name": "ADV-2008-3442",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3442"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in Kerio MailServer before 6.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) folder parameter to mailCompose.php or the (2) daytime parameter to calendarEdit.php.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "32863",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32863"
        },
        {
          "name": "32955",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32955"
        },
        {
          "name": "mailerserver-mailcompose-calendaredit-xss(47397)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47397"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/security_advisory.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        },
        {
          "name": "ADV-2008-3442",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3442"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5769",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in Kerio MailServer before 6.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) folder parameter to mailCompose.php or the (2) daytime parameter to calendarEdit.php.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "32863",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32863"
            },
            {
              "name": "32955",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32955"
            },
            {
              "name": "mailerserver-mailcompose-calendaredit-xss(47397)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47397"
            },
            {
              "name": "http://www.kerio.com/security_advisory.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/security_advisory.html"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            },
            {
              "name": "ADV-2008-3442",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3442"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5769",
    "datePublished": "2008-12-30T20:00:00",
    "dateReserved": "2008-12-30T00:00:00",
    "dateUpdated": "2024-08-07T11:04:44.387Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5760 (GCVE-0-2008-5760)

Vulnerability from nvd – Published: 2008-12-30 19:00 – Updated: 2024-08-07 11:04
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in error413.php in Kerio MailServer before 6.6.2 allows remote attackers to inject arbitrary web script or HTML via the sent parameter. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:04:44.550Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "32863",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32863"
          },
          {
            "name": "32955",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32955"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/security_advisory.html"
          },
          {
            "name": "mailserver-error413-xss(47398)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47398"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          },
          {
            "name": "ADV-2008-3442",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3442"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in error413.php in Kerio MailServer before 6.6.2 allows remote attackers to inject arbitrary web script or HTML via the sent parameter.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "32863",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32863"
        },
        {
          "name": "32955",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32955"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/security_advisory.html"
        },
        {
          "name": "mailserver-error413-xss(47398)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47398"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        },
        {
          "name": "ADV-2008-3442",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3442"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5760",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in error413.php in Kerio MailServer before 6.6.2 allows remote attackers to inject arbitrary web script or HTML via the sent parameter.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "32863",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32863"
            },
            {
              "name": "32955",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32955"
            },
            {
              "name": "http://www.kerio.com/security_advisory.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/security_advisory.html"
            },
            {
              "name": "mailserver-error413-xss(47398)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47398"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            },
            {
              "name": "ADV-2008-3442",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3442"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5760",
    "datePublished": "2008-12-30T19:00:00",
    "dateReserved": "2008-12-30T00:00:00",
    "dateUpdated": "2024-08-07T11:04:44.550Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0858 (GCVE-0-2008-0858)

Vulnerability from nvd – Published: 2008-02-21 00:00 – Updated: 2024-08-07 08:01
VLAI?
Summary
Buffer overflow in the Visnetic anti-virus plugin in Kerio MailServer before 6.5.0 might allow remote attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1019428 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/0594 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/29021 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/27868 vdb-entryx_refsource_BID
http://www.kerio.com/kms_history.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:01:40.066Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1019428",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019428"
          },
          {
            "name": "ADV-2008-0594",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0594"
          },
          {
            "name": "29021",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29021"
          },
          {
            "name": "27868",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27868"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the Visnetic anti-virus plugin in Kerio MailServer before 6.5.0 might allow remote attackers to execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1019428",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019428"
        },
        {
          "name": "ADV-2008-0594",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0594"
        },
        {
          "name": "29021",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29021"
        },
        {
          "name": "27868",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27868"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0858",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the Visnetic anti-virus plugin in Kerio MailServer before 6.5.0 might allow remote attackers to execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1019428",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019428"
            },
            {
              "name": "ADV-2008-0594",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0594"
            },
            {
              "name": "29021",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29021"
            },
            {
              "name": "27868",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27868"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0858",
    "datePublished": "2008-02-21T00:00:00",
    "dateReserved": "2008-02-20T00:00:00",
    "dateUpdated": "2024-08-07T08:01:40.066Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0859 (GCVE-0-2008-0859)

Vulnerability from nvd – Published: 2008-02-21 00:00 – Updated: 2024-08-07 08:01
VLAI?
Summary
Unspecified vulnerability in Kerio MailServer before 6.5.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors related to decoding of uuencoded input, which triggers memory corruption.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1019428 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/0594 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/29021 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/27868 vdb-entryx_refsource_BID
http://www.kerio.com/kms_history.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:01:39.847Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1019428",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019428"
          },
          {
            "name": "ADV-2008-0594",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0594"
          },
          {
            "name": "29021",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29021"
          },
          {
            "name": "27868",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27868"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Kerio MailServer before 6.5.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors related to decoding of uuencoded input, which triggers memory corruption."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1019428",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019428"
        },
        {
          "name": "ADV-2008-0594",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0594"
        },
        {
          "name": "29021",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29021"
        },
        {
          "name": "27868",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27868"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0859",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Kerio MailServer before 6.5.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors related to decoding of uuencoded input, which triggers memory corruption."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1019428",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019428"
            },
            {
              "name": "ADV-2008-0594",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0594"
            },
            {
              "name": "29021",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29021"
            },
            {
              "name": "27868",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27868"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0859",
    "datePublished": "2008-02-21T00:00:00",
    "dateReserved": "2008-02-20T00:00:00",
    "dateUpdated": "2024-08-07T08:01:39.847Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0860 (GCVE-0-2008-0860)

Vulnerability from nvd – Published: 2008-02-21 00:00 – Updated: 2024-08-07 08:01
VLAI?
Summary
Unspecified vulnerability in the AVG plugin in Kerio MailServer before 6.5.0 has unspecified impact via unknown remote attack vectors related to null DACLs.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1019428 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/0594 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/29021 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/27868 vdb-entryx_refsource_BID
http://www.kerio.com/kms_history.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:01:39.911Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1019428",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019428"
          },
          {
            "name": "ADV-2008-0594",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0594"
          },
          {
            "name": "29021",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29021"
          },
          {
            "name": "27868",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27868"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the AVG plugin in Kerio MailServer before 6.5.0 has unspecified impact via unknown remote attack vectors related to null DACLs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1019428",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019428"
        },
        {
          "name": "ADV-2008-0594",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0594"
        },
        {
          "name": "29021",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29021"
        },
        {
          "name": "27868",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27868"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0860",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the AVG plugin in Kerio MailServer before 6.5.0 has unspecified impact via unknown remote attack vectors related to null DACLs."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1019428",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019428"
            },
            {
              "name": "ADV-2008-0594",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0594"
            },
            {
              "name": "29021",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29021"
            },
            {
              "name": "27868",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27868"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0860",
    "datePublished": "2008-02-21T00:00:00",
    "dateReserved": "2008-02-20T00:00:00",
    "dateUpdated": "2024-08-07T08:01:39.911Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3993 (GCVE-0-2007-3993)

Vulnerability from nvd – Published: 2007-07-25 18:00 – Updated: 2024-08-07 14:37
VLAI?
Summary
Unspecified vulnerability in the attachment filter in Kerio MailServer before 6.4.1 has unknown impact and remote attack vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2007/2637 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/26185 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/25038 vdb-entryx_refsource_BID
http://osvdb.org/38571 vdb-entryx_refsource_OSVDB
http://www.kerio.com/kms_history.html x_refsource_CONFIRM
http://www.securitytracker.com/id?1018453 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:37:05.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2007-2637",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2637"
          },
          {
            "name": "26185",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26185"
          },
          {
            "name": "keriomailserver-filter-unspecified(35618)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35618"
          },
          {
            "name": "25038",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25038"
          },
          {
            "name": "38571",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/38571"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          },
          {
            "name": "1018453",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018453"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the attachment filter in Kerio MailServer before 6.4.1 has unknown impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2007-2637",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2637"
        },
        {
          "name": "26185",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26185"
        },
        {
          "name": "keriomailserver-filter-unspecified(35618)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35618"
        },
        {
          "name": "25038",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25038"
        },
        {
          "name": "38571",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/38571"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        },
        {
          "name": "1018453",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018453"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3993",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the attachment filter in Kerio MailServer before 6.4.1 has unknown impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2007-2637",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2637"
            },
            {
              "name": "26185",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26185"
            },
            {
              "name": "keriomailserver-filter-unspecified(35618)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35618"
            },
            {
              "name": "25038",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25038"
            },
            {
              "name": "38571",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/38571"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            },
            {
              "name": "1018453",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018453"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3993",
    "datePublished": "2007-07-25T18:00:00",
    "dateReserved": "2007-07-25T00:00:00",
    "dateUpdated": "2024-08-07T14:37:05.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6554 (GCVE-0-2006-6554)

Vulnerability from nvd – Published: 2006-12-14 18:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Unspecified vulnerability in Kerio MailServer before 6.3.1 allows remote attackers to cause a denial of service (segmentation fault and service stop) via certain long LDAP queries, as demonstrated by vd_kms6.pm.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:33:58.589Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "keriomailserver-ldap-dos(30872)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30872"
          },
          {
            "name": "23364",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23364"
          },
          {
            "name": "20061214 Kerio MailServer \u003c 6.3.1 remote Denial of Service",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/454455/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kerio.com/kms_history.html"
          },
          {
            "name": "ADV-2006-4993",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4993"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Kerio MailServer before 6.3.1 allows remote attackers to cause a denial of service (segmentation fault and service stop) via certain long LDAP queries, as demonstrated by vd_kms6.pm."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "keriomailserver-ldap-dos(30872)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30872"
        },
        {
          "name": "23364",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23364"
        },
        {
          "name": "20061214 Kerio MailServer \u003c 6.3.1 remote Denial of Service",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/454455/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kerio.com/kms_history.html"
        },
        {
          "name": "ADV-2006-4993",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4993"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6554",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Kerio MailServer before 6.3.1 allows remote attackers to cause a denial of service (segmentation fault and service stop) via certain long LDAP queries, as demonstrated by vd_kms6.pm."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "keriomailserver-ldap-dos(30872)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30872"
            },
            {
              "name": "23364",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23364"
            },
            {
              "name": "20061214 Kerio MailServer \u003c 6.3.1 remote Denial of Service",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/454455/100/0/threaded"
            },
            {
              "name": "http://www.kerio.com/kms_history.html",
              "refsource": "CONFIRM",
              "url": "http://www.kerio.com/kms_history.html"
            },
            {
              "name": "ADV-2006-4993",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4993"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6554",
    "datePublished": "2006-12-14T18:00:00",
    "dateReserved": "2006-12-14T00:00:00",
    "dateUpdated": "2024-08-07T20:33:58.589Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5812 (GCVE-0-2006-5812)

Vulnerability from nvd – Published: 2006-11-08 23:00 – Updated: 2024-08-07 20:04
VLAI?
Summary
Unspecified vulnerability in Kerio MailServer allows attackers to cause a denial of service, as demonstrated by vd_kms4.pm, a "Kerio MailServer DoS." NOTE: As of 20061108, this disclosure has no actionable information. However, since it is from a reliable researcher, it is being assigned a CVE identifier for tracking purposes.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://gleg.net/vulndisco_meta.shtml x_refsource_MISC
http://secunia.com/advisories/22861 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1017171 vdb-entryx_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:04:55.670Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://gleg.net/vulndisco_meta.shtml"
          },
          {
            "name": "22861",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22861"
          },
          {
            "name": "1017171",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017171"
          },
          {
            "name": "kerio-mailserver-dos(30145)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30145"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Kerio MailServer allows attackers to cause a denial of service, as demonstrated by vd_kms4.pm, a \"Kerio MailServer DoS.\" NOTE: As of 20061108, this disclosure has no actionable information. However, since it is from a reliable researcher, it is being assigned a CVE identifier for tracking purposes."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://gleg.net/vulndisco_meta.shtml"
        },
        {
          "name": "22861",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22861"
        },
        {
          "name": "1017171",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017171"
        },
        {
          "name": "kerio-mailserver-dos(30145)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30145"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5812",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Kerio MailServer allows attackers to cause a denial of service, as demonstrated by vd_kms4.pm, a \"Kerio MailServer DoS.\" NOTE: As of 20061108, this disclosure has no actionable information. However, since it is from a reliable researcher, it is being assigned a CVE identifier for tracking purposes."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://gleg.net/vulndisco_meta.shtml",
              "refsource": "MISC",
              "url": "http://gleg.net/vulndisco_meta.shtml"
            },
            {
              "name": "22861",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22861"
            },
            {
              "name": "1017171",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017171"
            },
            {
              "name": "kerio-mailserver-dos(30145)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30145"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5812",
    "datePublished": "2006-11-08T23:00:00",
    "dateReserved": "2006-11-08T00:00:00",
    "dateUpdated": "2024-08-07T20:04:55.670Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}