Search criteria
87 vulnerabilities found for mailenable_enterprise by mailenable
FKIE_CVE-2008-1276
Vulnerability from fkie_nvd - Published: 2008-03-10 23:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_enterprise | * | |
| mailenable | mailenable_professional | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6496BBB-BF66-4CA5-B1E1-BF65D58DEB0E",
"versionEndIncluding": "3.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46C4F770-9BCC-42AB-B04C-3ACD60357472",
"versionEndIncluding": "3.13",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands."
},
{
"lang": "es",
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en el Servicio IMAP (MEIMAPS.EXE) de MailEnable Professional Edition y Enterprise Edition 3.13 y anteriores, permite a atacantes autenticados remotamente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de argumentos largos hacia los comandos (1) FETCH, (2) EXAMINE y (3) UNSUBSCRIBE."
}
],
"id": "CVE-2008-1276",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-03-10T23:44:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29277"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/3724"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/28145"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1019565"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/5249"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29277"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/3724"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/28145"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1019565"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/5249"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-1275
Vulnerability from fkie_nvd - Published: 2008-03-10 23:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_enterprise | * | |
| mailenable | mailenable_professional | * | |
| mailenable | mailenable_standard | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDBCAC5-9215-487B-BFC1-A55982352714",
"versionEndIncluding": "3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
"matchCriteriaId": "77ED3854-23DD-4153-8A40-F26F975CAE72",
"versionEndIncluding": "3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B924438E-5E77-43D5-873C-70F1B2FE4191",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades no especificadas en el servicio SMTP de MailEnable Standard Edition 1.x, Professional Edition 3.x y anteriores, y Enterprise Edition 3.x y anteriores, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante los comandos manipulados (1) EXPN o (2) VRFY."
}
],
"id": "CVE-2008-1275",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-03-10T23:44:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29300"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/28154"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29300"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/28154"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/5235"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-1277
Vulnerability from fkie_nvd - Published: 2008-03-10 23:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_enterprise | * | |
| mailenable | mailenable_professional | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6496BBB-BF66-4CA5-B1E1-BF65D58DEB0E",
"versionEndIncluding": "3.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46C4F770-9BCC-42AB-B04C-3ACD60357472",
"versionEndIncluding": "3.13",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference."
},
{
"lang": "es",
"value": "El servicio IMAP (MEIMAPS.exe) en MailEnable Professional Edition y Enterprise Edition 3.13 y anteriores, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de los comandos (1) SEARCH y (2) APPEND que no tengan los argumentos requeridos, esto induce a una referencia a puntero nulo."
}
],
"id": "CVE-2008-1277",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-03-10T23:44:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29277"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/3724"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/28145"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1019565"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29277"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/3724"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/28145"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1019565"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-1301
Vulnerability from fkie_nvd - Published: 2007-03-07 00:19 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_enterprise | * | |
| mailenable | mailenable_professional | 2.37 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "794B82C8-E0B2-4B79-BF36-3FB9E09AE5FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.37:*:professional:*:*:*:*:*",
"matchCriteriaId": "6DC1B3DE-6F03-47BA-AF5C-CDA53120AF41",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en el servicio IMAP de MailEnable ediciones Enterprise y Professional 2.37 y anteriores permite a usuarios remotos autenticados ejecutar c\u00f3digo de su elecci\u00f3n mediante una argumento largo al comando APPEND. NOTA: esta vulnerabilidad es, probablemente, diferente que CVE-2006-6423."
}
],
"id": "CVE-2007-1301",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-03-07T00:19:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24361"
},
{
"source": "cve@mitre.org",
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/22792"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1017739"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/0811"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/3397"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/22792"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1017739"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0811"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/3397"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-6997
Vulnerability from fkie_nvd - Published: 2007-02-12 11:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_enterprise | 1.0 | |
| mailenable | mailenable_enterprise | 1.00 | |
| mailenable | mailenable_enterprise | 1.1 | |
| mailenable | mailenable_enterprise | 1.01 | |
| mailenable | mailenable_enterprise | 1.02 | |
| mailenable | mailenable_enterprise | 1.2 | |
| mailenable | mailenable_enterprise | 1.03 | |
| mailenable | mailenable_enterprise | 1.04 | |
| mailenable | mailenable_standard | 1.71 | |
| mailenable | mailenable_standard | 1.72 | |
| mailenable | mailenable_standard | 1.701 | |
| mailenable | mailenable_standard | 1.702 | |
| mailenable | mailenable_standard | 1.703 | |
| mailenable | mailenable_standard | 1.704 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1E228B31-0D62-41E3-A475-550BBFAA4336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
"matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
"matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
"matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*",
"matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*",
"matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*",
"matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*",
"matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*",
"matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*",
"matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en la caracter\u00edstica cryptographic en MailEnable Standard Edition anetrior a 1.93, Professional Edition anterior a 1.73, y Enterprise Edition anterior a 1.21 lleva a \"validaci\u00f3n de seguridad debil\" con un impacto desconocido y vectores de ataque, NOTA: debido a la escasez de detalles, no es\u00e1 claro si esto es lo mismo que CVE-2006-1792."
}
],
"id": "CVE-2006-6997",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-02-12T11:28:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mailenable.com/standardhistory.asp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-6605
Vulnerability from fkie_nvd - Published: 2006-12-19 19:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_enterprise | * | |
| mailenable | mailenable_enterprise | 1.41 | |
| mailenable | mailenable_professional | * | |
| mailenable | mailenable_professional | 1.84 | |
| mailenable | mailenable_standard | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D4ECC9C-9D19-41F8-8A9A-86CDAAF591AB",
"versionEndIncluding": "2.35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "D83D1EA7-A3D6-41AA-B922-18885328D292",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7173C4E7-ACB7-4277-B4E8-79E655B97EEF",
"versionEndIncluding": "2.35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*",
"matchCriteriaId": "201B610A-DD27-48D2-A3EF-DFEBBDEA04BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7AAE8D3D-FF57-49B1-AE03-3ADB815A5DE8",
"versionEndIncluding": "1.98",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en el servicio POP de MailEnable Standard 1.98 y anteriores ; Professional 1.84, y 2.35 y anteriores; y Enterprise 1.41, y 2.35 y anteriores a ME-10026 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un argumento largo al comando PASS."
}
],
"id": "CVE-2006-6605",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-12-19T19:28:00.000",
"references": [
{
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/23127"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://securityreason.com/securityalert/2053"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://securitytracker.com/id?1017395"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://www.securityfocus.com/bid/21645"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://www.vupen.com/english/advisories/2006/5052"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/23127"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/2053"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1017395"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/21645"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
],
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-6484
Vulnerability from fkie_nvd - Published: 2006-12-12 20:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://secunia.com/advisories/23267 | Patch, Vendor Advisory | |
| cve@mitre.org | http://www.mailenable.com/hotfix/ | Patch, Vendor Advisory | |
| cve@mitre.org | http://www.securityfocus.com/bid/21493 | Vendor Advisory | |
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/30797 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23267 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mailenable.com/hotfix/ | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/21493 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/30797 |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6FB230-80C5-4B8D-898E-8C298B2207C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A640E156-FF31-48E6-9D98-E2E669C01C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "04B96ED6-16EB-42A4-BDC6-0EE45EA38B62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "455DD7A6-A83E-4200-B41B-505118FE8E14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5462F1-B6D9-43F0-982C-2E4534E79E02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "3248B134-BF1F-4109-A0DC-DF9A01CC8156",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "849A1A19-83BA-4984-947B-C47DAA515908",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "8E3C2B12-AF3A-44D9-9C91-58F4AB1FE188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "71A25D16-21ED-4EAD-A535-6000E77ECF35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "DC5AC063-9D7B-45A2-9D90-B85E2DFBB6F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "CD73FDB9-4A1E-4A8A-A541-21C7726A152C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "1491392B-467F-4CA0-B6D7-2A7478C4DFA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "4C3F71BC-639F-4966-B05D-5E3BB9C5FA3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "056C7707-A07C-4F4A-8390-97885581802F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "0025F745-D34D-4275-9A3B-5530B7A0A520",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB9ECA3-FFF5-447D-B685-666669410D7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*",
"matchCriteriaId": "B56A4283-E0DB-42CE-9551-FC3DBC7E50A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "F80F2B0F-8461-47C3-A07A-98681D255478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "D2E1599A-9928-4A06-B650-1238D62CD2C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "E07825D6-EBA0-42B5-BE18-DA3D440A986D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.33:*:*:*:*:*:*:*",
"matchCriteriaId": "3C153370-5AD2-4020-9656-5BDD7644F692",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "50451621-1AF5-4A17-9355-62D78DDAE7A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.35:*:*:*:*:*:*:*",
"matchCriteriaId": "EC62336F-5F8F-4FF7-B2FB-CBBBAEC77162",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.36:*:*:*:*:*:*:*",
"matchCriteriaId": "75BF5AF2-FAD4-48B4-B893-035F5A82A58D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.37:*:*:*:*:*:*:*",
"matchCriteriaId": "C4F5CF79-543F-4ECA-B5A3-5212A1D0A18E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.38:*:*:*:*:*:*:*",
"matchCriteriaId": "D80141E2-F98C-458C-BAFB-8272BD2BBE4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.39:*:*:*:*:*:*:*",
"matchCriteriaId": "CCA17BD7-A9FC-4FA3-88D4-38D9BD197963",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "393240E7-FE4F-4535-B5F0-6609F4A01646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABEB364-389B-46AF-B04F-88EC3AF9DB8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "35DD2182-B2D2-4BFB-BEE9-A9F0F8666791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C72359EA-1289-456C-BEB0-F7C910DE1A2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.32:*:*:*:*:*:*:*",
"matchCriteriaId": "84ACF997-81AF-45EC-9200-2C63B37D93D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.33:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC2DF4F-7D02-4BCE-BD59-5482EFF9262C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.34:*:*:*:*:*:*:*",
"matchCriteriaId": "E3FEF237-35BB-4298-B458-B933472D028B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*",
"matchCriteriaId": "6F4AADE9-F3FB-4272-8026-58FC677D3F3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*",
"matchCriteriaId": "9DD53801-B8F7-4AE8-BA2B-AC6297340CB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.82:*:*:*:*:*:*:*",
"matchCriteriaId": "4F785125-F530-4674-B2B3-0D97E8397391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.83:*:*:*:*:*:*:*",
"matchCriteriaId": "5F59A308-7D1A-4C4F-A34C-27FDCF12E3C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4FD7082-AC93-426F-9DA7-50CBFFDAC07A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0576FE-F0BC-4DA7-B007-7DA49F369700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B2826B3D-44E0-4D4B-A681-8C3DADF522F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.32:*:*:*:*:*:*:*",
"matchCriteriaId": "662AEDE4-698E-4C78-93B4-4B915749DF80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.33:*:*:*:*:*:*:*",
"matchCriteriaId": "87E5107B-BDC2-4972-A3A4-AA6782E46B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.34:*:*:*:*:*:*:*",
"matchCriteriaId": "6739BEA4-C75F-476E-AF5D-449D8236E042",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information."
},
{
"lang": "es",
"value": "El servicio IMAP para el MailEnable Professional y Enterprise Edition de la 2.0 a la 2.34 inclusive, Professional Edition de la 1.6 a la 1.83 inclusive, and Enterprise Edition de la 1.1 a la 1.40 inclusive, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante vectores sin especificar que disparan una referencia a un puntero nulo, como la tratada en el ME-10023 hotfix y diferente a la CVE-2006-6423. NOTA: algunos detalles se obtienen a partir de la informaci\u00f3n de terceros."
}
],
"id": "CVE-2006-6484",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-12-12T20:28:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/23267"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/21493"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/23267"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/21493"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-6423
Vulnerability from fkie_nvd - Published: 2006-12-12 02:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6FB230-80C5-4B8D-898E-8C298B2207C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A640E156-FF31-48E6-9D98-E2E669C01C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "04B96ED6-16EB-42A4-BDC6-0EE45EA38B62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "455DD7A6-A83E-4200-B41B-505118FE8E14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5462F1-B6D9-43F0-982C-2E4534E79E02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "3248B134-BF1F-4109-A0DC-DF9A01CC8156",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "849A1A19-83BA-4984-947B-C47DAA515908",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "8E3C2B12-AF3A-44D9-9C91-58F4AB1FE188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "71A25D16-21ED-4EAD-A535-6000E77ECF35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "DC5AC063-9D7B-45A2-9D90-B85E2DFBB6F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "CD73FDB9-4A1E-4A8A-A541-21C7726A152C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "1491392B-467F-4CA0-B6D7-2A7478C4DFA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "4C3F71BC-639F-4966-B05D-5E3BB9C5FA3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "056C7707-A07C-4F4A-8390-97885581802F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "0025F745-D34D-4275-9A3B-5530B7A0A520",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB9ECA3-FFF5-447D-B685-666669410D7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*",
"matchCriteriaId": "B56A4283-E0DB-42CE-9551-FC3DBC7E50A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "F80F2B0F-8461-47C3-A07A-98681D255478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "D2E1599A-9928-4A06-B650-1238D62CD2C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "E07825D6-EBA0-42B5-BE18-DA3D440A986D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.33:*:*:*:*:*:*:*",
"matchCriteriaId": "3C153370-5AD2-4020-9656-5BDD7644F692",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "50451621-1AF5-4A17-9355-62D78DDAE7A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.35:*:*:*:*:*:*:*",
"matchCriteriaId": "EC62336F-5F8F-4FF7-B2FB-CBBBAEC77162",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.36:*:*:*:*:*:*:*",
"matchCriteriaId": "75BF5AF2-FAD4-48B4-B893-035F5A82A58D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.37:*:*:*:*:*:*:*",
"matchCriteriaId": "C4F5CF79-543F-4ECA-B5A3-5212A1D0A18E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.38:*:*:*:*:*:*:*",
"matchCriteriaId": "D80141E2-F98C-458C-BAFB-8272BD2BBE4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.39:*:*:*:*:*:*:*",
"matchCriteriaId": "CCA17BD7-A9FC-4FA3-88D4-38D9BD197963",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "393240E7-FE4F-4535-B5F0-6609F4A01646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "D83D1EA7-A3D6-41AA-B922-18885328D292",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.35:*:*:*:*:*:*:*",
"matchCriteriaId": "B0743346-9637-498F-BAAF-B193E41A7927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*",
"matchCriteriaId": "201B610A-DD27-48D2-A3EF-DFEBBDEA04BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en el servicio IMAP para MailEnable Professional y Enterprise Edition 2.0 hasta 2.35, Professional Edition 1.6 hasta 1.84, y Enterprise Edition 1.1 hasta 1.41 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un comando de pre-autenticaci\u00f3n seguido de un par\u00e1metro manipulado y una cadena larga como se indica en la actualizaci\u00f3n r\u00e1pida (hotfix) ME-10025"
}
],
"id": "CVE-2006-6423",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-12-12T02:28:00.000",
"references": [
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://secunia.com/advisories/23201"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/secunia_research/2006-73/advisory/"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://securityreason.com/securityalert/2022"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://www.securityfocus.com/bid/21492"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/23201"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/secunia_research/2006-73/advisory/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/2022"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/21492"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796"
}
],
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-6290
Vulnerability from fkie_nvd - Published: 2006-12-05 11:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6FB230-80C5-4B8D-898E-8C298B2207C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A640E156-FF31-48E6-9D98-E2E669C01C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "04B96ED6-16EB-42A4-BDC6-0EE45EA38B62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "455DD7A6-A83E-4200-B41B-505118FE8E14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5462F1-B6D9-43F0-982C-2E4534E79E02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "3248B134-BF1F-4109-A0DC-DF9A01CC8156",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "849A1A19-83BA-4984-947B-C47DAA515908",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "8E3C2B12-AF3A-44D9-9C91-58F4AB1FE188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "71A25D16-21ED-4EAD-A535-6000E77ECF35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "DC5AC063-9D7B-45A2-9D90-B85E2DFBB6F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "CD73FDB9-4A1E-4A8A-A541-21C7726A152C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "1491392B-467F-4CA0-B6D7-2A7478C4DFA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "4C3F71BC-639F-4966-B05D-5E3BB9C5FA3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "056C7707-A07C-4F4A-8390-97885581802F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "0025F745-D34D-4275-9A3B-5530B7A0A520",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB9ECA3-FFF5-447D-B685-666669410D7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*",
"matchCriteriaId": "B56A4283-E0DB-42CE-9551-FC3DBC7E50A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "F80F2B0F-8461-47C3-A07A-98681D255478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABEB364-389B-46AF-B04F-88EC3AF9DB8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "35DD2182-B2D2-4BFB-BEE9-A9F0F8666791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "E89D25B0-6924-4561-A056-972F80740E23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C72359EA-1289-456C-BEB0-F7C910DE1A2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "BB079D44-2AD7-44B1-A8A8-AF8166CEED45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.04:*:*:*:*:*:*:*",
"matchCriteriaId": "F0F70886-33C4-419B-BF7E-26EAB3DDD1AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "574E97CD-A04F-4BE8-86AA-07B9275D583D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.06:*:*:*:*:*:*:*",
"matchCriteriaId": "AB8D602E-C0A9-4134-90E2-18FA49741563",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.07:*:*:*:*:*:*:*",
"matchCriteriaId": "E9CA827C-43C6-4EA4-AF50-984E0EE035AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.08:*:*:*:*:*:*:*",
"matchCriteriaId": "95859193-BD9A-43D2-AD49-F405F5ACB44F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.09:*:*:*:*:*:*:*",
"matchCriteriaId": "C880FF94-935E-4023-82A3-E2CD62E13BAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "395D0374-CEB6-4D59-BAB5-499C6E90BBCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "78486120-1FBD-454B-8CC7-5727889E66B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "52A55CDE-4AF8-4458-8E72-426588A46188",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2296B9-4F7E-491A-B209-6D79BC5C9105",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "2074C3AE-08BF-49A0-BE7E-065671BF8742",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "D1FA7867-EACD-43BD-9D5A-CFA5EAB8CAEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B14B554F-92D2-41DA-B57F-830447161948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "5E08ADC5-7B68-4440-BA96-0B97E360C3E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "FD43B0A5-5440-46B2-AC91-0565F9E08AE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "BAD474D9-182E-4572-9F8F-652756189721",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "54CC311F-0F3F-4465-84ED-D2BA24632819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF0DCBB-F15A-4443-82B1-DF71CA06551D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "31732C13-5587-43FC-89CE-30DEC4E8D30B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "29DDED08-3561-48C1-94E6-F27F2DA18FD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "66B3190A-FE7C-430C-9B80-3228803085E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "16948701-ED10-440B-9B59-D8D51C7C031F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "891E7776-DEBD-4282-86C7-22F59F73B216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "A62419C7-789F-4131-BE98-3B546E946F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "BC923FB9-90C6-4433-BF94-CF87FA2255BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.31:*:*:*:*:*:*:*",
"matchCriteriaId": "BF0E9D73-4283-44AE-BFB9-159FE84580A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.32:*:*:*:*:*:*:*",
"matchCriteriaId": "84ACF997-81AF-45EC-9200-2C63B37D93D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.33:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC2DF4F-7D02-4BCE-BD59-5482EFF9262C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.82:*:*:*:*:*:*:*",
"matchCriteriaId": "4F785125-F530-4674-B2B3-0D97E8397391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4FD7082-AC93-426F-9DA7-50CBFFDAC07A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.33:*:*:*:*:*:*:*",
"matchCriteriaId": "87E5107B-BDC2-4972-A3A4-AA6782E46B0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer basados en pila en el m\u00f3dulo IMAP (MEIMAPS.EXE) de MailEnable Professional 1.6 hasta 1.82 y 2.0 hasta 2.33, y MailEnable Enterprise 1.1 hasta 1.30 y 2.0 hasta 2.33 permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (ca\u00edda) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un argumento largo a los comandos (1) EXAMINE o (2) SELECT."
}
],
"id": "CVE-2006-6290",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-12-05T11:28:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/23047"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/23080"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/secunia_research/2006-71/advisory/"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1017276"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1017319"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/21362"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/4673"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/4778"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/23047"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/23080"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/secunia_research/2006-71/advisory/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1017276"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1017319"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/21362"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/4673"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/4778"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-5176
Vulnerability from fkie_nvd - Published: 2006-10-10 04:06 - Updated: 2025-04-09 00:30
Severity ?
Summary
Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via "the signature field of NTLM Type 1 messages".
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_enterprise | 2.0 | |
| mailenable | mailenable_professional | 2.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABEB364-389B-46AF-B04F-88EC3AF9DB8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4FD7082-AC93-426F-9DA7-50CBFFDAC07A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via \"the signature field of NTLM Type 1 messages\"."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en la validaci\u00f3n NTLM enMailEnable Professional 2.0 y Enterprise 2.0 permite a un atacante remoto ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de \"el campo de mensajes de firma de NTLM Tipo 1\"."
}
],
"evaluatorSolution": "Hotfixes are available on the vendor web site that address this and related vulnerabilities.",
"id": "CVE-2006-5176",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-10-10T04:06:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/22179"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/20290"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/3862"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29284"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/22179"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/20290"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/3862"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29284"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-5177
Vulnerability from fkie_nvd - Published: 2006-10-10 04:06 - Updated: 2025-04-09 00:30
Severity ?
Summary
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_enterprise | 2.0 | |
| mailenable | mailenable_professional | 2.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABEB364-389B-46AF-B04F-88EC3AF9DB8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4FD7082-AC93-426F-9DA7-50CBFFDAC07A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read."
},
{
"lang": "es",
"value": "La validaci\u00f3n NTLM en MailEnable Professional 2.0 y Enterprise 2.0 permite a un atacante remoto (1)ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados que afectan a codificaci\u00f3n artesanal base64 mensajes NTLM Tipo 3, o (2) provoca denegaci\u00f3n de servicio a trav\u00e9s de la codificaci\u00f3n base64 de mensajes NTLM Tipo 1, lo cual dispara una sobre lectura de b\u00fafer."
}
],
"id": "CVE-2006-5177",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-10-10T04:06:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/22179"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/20290"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/3862"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/22179"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/20290"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/3862"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2008-1277 (GCVE-0-2008-1277)
Vulnerability from cvelistv5 – Published: 2008-03-10 23:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:34.437Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "29277",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29277"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"name": "ADV-2008-0799",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"name": "3724",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3724"
},
{
"name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"name": "1019565",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019565"
},
{
"name": "28145",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28145"
},
{
"name": "mailenable-imapservice-dos(41059)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "29277",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29277"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"name": "ADV-2008-0799",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"name": "3724",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3724"
},
{
"name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"name": "1019565",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019565"
},
{
"name": "28145",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28145"
},
{
"name": "mailenable-imapservice-dos(41059)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1277",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "29277",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29277"
},
{
"name": "http://aluigi.altervista.org/adv/maildisable-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"name": "ADV-2008-0799",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"name": "3724",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3724"
},
{
"name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"name": "1019565",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019565"
},
{
"name": "28145",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28145"
},
{
"name": "mailenable-imapservice-dos(41059)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1277",
"datePublished": "2008-03-10T23:00:00",
"dateReserved": "2008-03-10T00:00:00",
"dateUpdated": "2024-08-07T08:17:34.437Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1276 (GCVE-0-2008-1276)
Vulnerability from cvelistv5 – Published: 2008-03-10 23:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:33.548Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "29277",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29277"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"name": "5249",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/5249"
},
{
"name": "ADV-2008-0799",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"name": "3724",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3724"
},
{
"name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"name": "1019565",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019565"
},
{
"name": "28145",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28145"
},
{
"name": "mailenable-imapservice-bo(41058)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "29277",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29277"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"name": "5249",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/5249"
},
{
"name": "ADV-2008-0799",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"name": "3724",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3724"
},
{
"name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"name": "1019565",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019565"
},
{
"name": "28145",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28145"
},
{
"name": "mailenable-imapservice-bo(41058)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1276",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "29277",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29277"
},
{
"name": "http://aluigi.altervista.org/adv/maildisable-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"name": "5249",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5249"
},
{
"name": "ADV-2008-0799",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"name": "3724",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3724"
},
{
"name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"name": "1019565",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019565"
},
{
"name": "28145",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28145"
},
{
"name": "mailenable-imapservice-bo(41058)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1276",
"datePublished": "2008-03-10T23:00:00",
"dateReserved": "2008-03-10T00:00:00",
"dateUpdated": "2024-08-07T08:17:33.548Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1275 (GCVE-0-2008-1275)
Vulnerability from cvelistv5 – Published: 2008-03-10 23:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:34.526Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "5235",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"name": "mailenable-expn-vrfy-dos(41083)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"name": "28154",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28154"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2008-0800",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"name": "29300",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29300"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "5235",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"name": "mailenable-expn-vrfy-dos(41083)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"name": "28154",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28154"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2008-0800",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"name": "29300",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29300"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1275",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "5235",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"name": "mailenable-expn-vrfy-dos(41083)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"name": "28154",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28154"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2008-0800",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"name": "29300",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29300"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1275",
"datePublished": "2008-03-10T23:00:00",
"dateReserved": "2008-03-10T00:00:00",
"dateUpdated": "2024-08-07T08:17:34.526Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1301 (GCVE-0-2007-1301)
Vulnerability from cvelistv5 – Published: 2007-03-07 00:00 – Updated: 2024-08-07 12:50
VLAI?
Summary
Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:50:35.259Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-0811",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0811"
},
{
"name": "mailenable-append-bo(32801)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801"
},
{
"name": "24361",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24361"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "22792",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22792"
},
{
"name": "1017739",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017739"
},
{
"name": "3397",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/3397"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-0811",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0811"
},
{
"name": "mailenable-append-bo(32801)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801"
},
{
"name": "24361",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24361"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "22792",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22792"
},
{
"name": "1017739",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017739"
},
{
"name": "3397",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/3397"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1301",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-0811",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0811"
},
{
"name": "mailenable-append-bo(32801)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801"
},
{
"name": "24361",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24361"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "22792",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22792"
},
{
"name": "1017739",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017739"
},
{
"name": "3397",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3397"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1301",
"datePublished": "2007-03-07T00:00:00",
"dateReserved": "2007-03-06T00:00:00",
"dateUpdated": "2024-08-07T12:50:35.259Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6997 (GCVE-0-2006-6997)
Vulnerability from cvelistv5 – Published: 2007-02-12 11:00 – Updated: 2024-09-17 02:33
VLAI?
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:50:05.730Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2007-02-12T11:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6997",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mailenable.com/professionalhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"name": "http://www.mailenable.com/enterprisehistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"name": "http://www.mailenable.com/standardhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/standardhistory.asp"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-6997",
"datePublished": "2007-02-12T11:00:00Z",
"dateReserved": "2007-02-12T00:00:00Z",
"dateUpdated": "2024-09-17T02:33:03.597Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6605 (GCVE-0-2006-6605)
Vulnerability from cvelistv5 – Published: 2006-12-19 19:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:33:59.771Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1017395",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017395"
},
{
"name": "23127",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23127"
},
{
"name": "2053",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/2053"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "21645",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21645"
},
{
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name": "ADV-2006-5052",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-12-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"shortName": "flexera"
},
"references": [
{
"name": "1017395",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017395"
},
{
"name": "23127",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23127"
},
{
"name": "2053",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/2053"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "21645",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21645"
},
{
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name": "ADV-2006-5052",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-6605",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1017395",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017395"
},
{
"name": "23127",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23127"
},
{
"name": "2053",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2053"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "21645",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21645"
},
{
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"name": "http://secunia.com/secunia_research/2006-75/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name": "ADV-2006-5052",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"assignerShortName": "flexera",
"cveId": "CVE-2006-6605",
"datePublished": "2006-12-19T19:00:00",
"dateReserved": "2006-12-17T00:00:00",
"dateUpdated": "2024-08-07T20:33:59.771Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6484 (GCVE-0-2006-6484)
Vulnerability from cvelistv5 – Published: 2006-12-12 20:00 – Updated: 2024-08-07 20:26
VLAI?
Summary
The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:26:46.583Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "21493",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21493"
},
{
"name": "mailenable-null-imap-dos(30797)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797"
},
{
"name": "23267",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23267"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-12-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "21493",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21493"
},
{
"name": "mailenable-null-imap-dos(30797)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797"
},
{
"name": "23267",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23267"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6484",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "21493",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21493"
},
{
"name": "mailenable-null-imap-dos(30797)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797"
},
{
"name": "23267",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23267"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-6484",
"datePublished": "2006-12-12T20:00:00",
"dateReserved": "2006-12-12T00:00:00",
"dateUpdated": "2024-08-07T20:26:46.583Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6423 (GCVE-0-2006-6423)
Vulnerability from cvelistv5 – Published: 2006-12-12 02:00 – Updated: 2024-08-07 20:26
VLAI?
Summary
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:26:46.508Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://secunia.com/secunia_research/2006-73/advisory/"
},
{
"name": "2022",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/2022"
},
{
"name": "21492",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21492"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "mailenable-bounds-imap-bo(30796)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796"
},
{
"name": "23201",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23201"
},
{
"name": "20061211 Secunia Research: MailEnable IMAP Service Buffer OverflowVulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-12-08T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"shortName": "flexera"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://secunia.com/secunia_research/2006-73/advisory/"
},
{
"name": "2022",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/2022"
},
{
"name": "21492",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21492"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "mailenable-bounds-imap-bo(30796)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796"
},
{
"name": "23201",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23201"
},
{
"name": "20061211 Secunia Research: MailEnable IMAP Service Buffer OverflowVulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-6423",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://secunia.com/secunia_research/2006-73/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-73/advisory/"
},
{
"name": "2022",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2022"
},
{
"name": "21492",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21492"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "mailenable-bounds-imap-bo(30796)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796"
},
{
"name": "23201",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23201"
},
{
"name": "20061211 Secunia Research: MailEnable IMAP Service Buffer OverflowVulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"assignerShortName": "flexera",
"cveId": "CVE-2006-6423",
"datePublished": "2006-12-12T02:00:00",
"dateReserved": "2006-12-09T00:00:00",
"dateUpdated": "2024-08-07T20:26:46.508Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6290 (GCVE-0-2006-6290)
Vulnerability from cvelistv5 – Published: 2006-12-05 11:00 – Updated: 2024-08-07 20:19
VLAI?
Summary
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:19:35.175Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1017276",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017276"
},
{
"name": "ADV-2006-4778",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/4778"
},
{
"name": "23080",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23080"
},
{
"name": "21362",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21362"
},
{
"name": "1017319",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017319"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2006-4673",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/4673"
},
{
"name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
},
{
"name": "23047",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23047"
},
{
"name": "mailenable-meimaps-bo(30614)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://secunia.com/secunia_research/2006-71/advisory/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-11-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1017276",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017276"
},
{
"name": "ADV-2006-4778",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/4778"
},
{
"name": "23080",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23080"
},
{
"name": "21362",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21362"
},
{
"name": "1017319",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017319"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2006-4673",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/4673"
},
{
"name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
},
{
"name": "23047",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23047"
},
{
"name": "mailenable-meimaps-bo(30614)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://secunia.com/secunia_research/2006-71/advisory/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6290",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1017276",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017276"
},
{
"name": "ADV-2006-4778",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4778"
},
{
"name": "23080",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23080"
},
{
"name": "21362",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21362"
},
{
"name": "1017319",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017319"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2006-4673",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4673"
},
{
"name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
},
{
"name": "23047",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23047"
},
{
"name": "mailenable-meimaps-bo(30614)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
},
{
"name": "http://secunia.com/secunia_research/2006-71/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-71/advisory/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-6290",
"datePublished": "2006-12-05T11:00:00",
"dateReserved": "2006-12-05T00:00:00",
"dateUpdated": "2024-08-07T20:19:35.175Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5177 (GCVE-0-2006-5177)
Vulnerability from cvelistv5 – Published: 2006-10-06 00:00 – Updated: 2024-08-07 19:41
VLAI?
Summary
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:41:05.016Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "mailenable-base64-message-code-execution(29287)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287"
},
{
"name": "22179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22179"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "mailenable-base64-ntml-message-dos(29286)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286"
},
{
"name": "20290",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/20290"
},
{
"name": "ADV-2006-3862",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3862"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-09-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "mailenable-base64-message-code-execution(29287)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287"
},
{
"name": "22179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22179"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "mailenable-base64-ntml-message-dos(29286)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286"
},
{
"name": "20290",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/20290"
},
{
"name": "ADV-2006-3862",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3862"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5177",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "mailenable-base64-message-code-execution(29287)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29287"
},
{
"name": "22179",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22179"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "mailenable-base64-ntml-message-dos(29286)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29286"
},
{
"name": "20290",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20290"
},
{
"name": "ADV-2006-3862",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3862"
},
{
"name": "http://labs.musecurity.com/advisories/MU-200609-01.txt",
"refsource": "MISC",
"url": "http://labs.musecurity.com/advisories/MU-200609-01.txt"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5177",
"datePublished": "2006-10-06T00:00:00",
"dateReserved": "2006-10-05T00:00:00",
"dateUpdated": "2024-08-07T19:41:05.016Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1277 (GCVE-0-2008-1277)
Vulnerability from nvd – Published: 2008-03-10 23:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:34.437Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "29277",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29277"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"name": "ADV-2008-0799",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"name": "3724",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3724"
},
{
"name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"name": "1019565",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019565"
},
{
"name": "28145",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28145"
},
{
"name": "mailenable-imapservice-dos(41059)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "29277",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29277"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"name": "ADV-2008-0799",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"name": "3724",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3724"
},
{
"name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"name": "1019565",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019565"
},
{
"name": "28145",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28145"
},
{
"name": "mailenable-imapservice-dos(41059)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1277",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a NULL pointer dereference."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "29277",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29277"
},
{
"name": "http://aluigi.altervista.org/adv/maildisable-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"name": "ADV-2008-0799",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"name": "3724",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3724"
},
{
"name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"name": "1019565",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019565"
},
{
"name": "28145",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28145"
},
{
"name": "mailenable-imapservice-dos(41059)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41059"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1277",
"datePublished": "2008-03-10T23:00:00",
"dateReserved": "2008-03-10T00:00:00",
"dateUpdated": "2024-08-07T08:17:34.437Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1276 (GCVE-0-2008-1276)
Vulnerability from nvd – Published: 2008-03-10 23:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:33.548Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "29277",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29277"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"name": "5249",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/5249"
},
{
"name": "ADV-2008-0799",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"name": "3724",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3724"
},
{
"name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"name": "1019565",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019565"
},
{
"name": "28145",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28145"
},
{
"name": "mailenable-imapservice-bo(41058)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "29277",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29277"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"name": "5249",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/5249"
},
{
"name": "ADV-2008-0799",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"name": "3724",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3724"
},
{
"name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"name": "1019565",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019565"
},
{
"name": "28145",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28145"
},
{
"name": "mailenable-imapservice-bo(41058)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1276",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "29277",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29277"
},
{
"name": "http://aluigi.altervista.org/adv/maildisable-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt"
},
{
"name": "5249",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5249"
},
{
"name": "ADV-2008-0799",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0799/references"
},
{
"name": "3724",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3724"
},
{
"name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded"
},
{
"name": "1019565",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019565"
},
{
"name": "28145",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28145"
},
{
"name": "mailenable-imapservice-bo(41058)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1276",
"datePublished": "2008-03-10T23:00:00",
"dateReserved": "2008-03-10T00:00:00",
"dateUpdated": "2024-08-07T08:17:33.548Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1275 (GCVE-0-2008-1275)
Vulnerability from nvd – Published: 2008-03-10 23:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:34.526Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "5235",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"name": "mailenable-expn-vrfy-dos(41083)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"name": "28154",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28154"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2008-0800",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"name": "29300",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29300"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "5235",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"name": "mailenable-expn-vrfy-dos(41083)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"name": "28154",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28154"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2008-0800",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"name": "29300",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29300"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1275",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "5235",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"name": "mailenable-expn-vrfy-dos(41083)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"name": "28154",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28154"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2008-0800",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"name": "29300",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29300"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1275",
"datePublished": "2008-03-10T23:00:00",
"dateReserved": "2008-03-10T00:00:00",
"dateUpdated": "2024-08-07T08:17:34.526Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-1301 (GCVE-0-2007-1301)
Vulnerability from nvd – Published: 2007-03-07 00:00 – Updated: 2024-08-07 12:50
VLAI?
Summary
Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:50:35.259Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-0811",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0811"
},
{
"name": "mailenable-append-bo(32801)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801"
},
{
"name": "24361",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24361"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "22792",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22792"
},
{
"name": "1017739",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017739"
},
{
"name": "3397",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/3397"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-0811",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0811"
},
{
"name": "mailenable-append-bo(32801)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801"
},
{
"name": "24361",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24361"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "22792",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22792"
},
{
"name": "1017739",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017739"
},
{
"name": "3397",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/3397"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1301",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably different than CVE-2006-6423."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-0811",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0811"
},
{
"name": "mailenable-append-bo(32801)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32801"
},
{
"name": "24361",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24361"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "22792",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22792"
},
{
"name": "1017739",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017739"
},
{
"name": "3397",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3397"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1301",
"datePublished": "2007-03-07T00:00:00",
"dateReserved": "2007-03-06T00:00:00",
"dateUpdated": "2024-08-07T12:50:35.259Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6997 (GCVE-0-2006-6997)
Vulnerability from nvd – Published: 2007-02-12 11:00 – Updated: 2024-09-17 02:33
VLAI?
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:50:05.730Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2007-02-12T11:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6997",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mailenable.com/professionalhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"name": "http://www.mailenable.com/enterprisehistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"name": "http://www.mailenable.com/standardhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/standardhistory.asp"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-6997",
"datePublished": "2007-02-12T11:00:00Z",
"dateReserved": "2007-02-12T00:00:00Z",
"dateUpdated": "2024-09-17T02:33:03.597Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6605 (GCVE-0-2006-6605)
Vulnerability from nvd – Published: 2006-12-19 19:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:33:59.771Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1017395",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017395"
},
{
"name": "23127",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23127"
},
{
"name": "2053",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/2053"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "21645",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21645"
},
{
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name": "ADV-2006-5052",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-12-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"shortName": "flexera"
},
"references": [
{
"name": "1017395",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017395"
},
{
"name": "23127",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23127"
},
{
"name": "2053",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/2053"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "21645",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21645"
},
{
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name": "ADV-2006-5052",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-6605",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1017395",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017395"
},
{
"name": "23127",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23127"
},
{
"name": "2053",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2053"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "21645",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21645"
},
{
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"name": "http://secunia.com/secunia_research/2006-75/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name": "ADV-2006-5052",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"assignerShortName": "flexera",
"cveId": "CVE-2006-6605",
"datePublished": "2006-12-19T19:00:00",
"dateReserved": "2006-12-17T00:00:00",
"dateUpdated": "2024-08-07T20:33:59.771Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6484 (GCVE-0-2006-6484)
Vulnerability from nvd – Published: 2006-12-12 20:00 – Updated: 2024-08-07 20:26
VLAI?
Summary
The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:26:46.583Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "21493",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21493"
},
{
"name": "mailenable-null-imap-dos(30797)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797"
},
{
"name": "23267",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23267"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-12-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "21493",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21493"
},
{
"name": "mailenable-null-imap-dos(30797)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797"
},
{
"name": "23267",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23267"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6484",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "21493",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21493"
},
{
"name": "mailenable-null-imap-dos(30797)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30797"
},
{
"name": "23267",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23267"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-6484",
"datePublished": "2006-12-12T20:00:00",
"dateReserved": "2006-12-12T00:00:00",
"dateUpdated": "2024-08-07T20:26:46.583Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6423 (GCVE-0-2006-6423)
Vulnerability from nvd – Published: 2006-12-12 02:00 – Updated: 2024-08-07 20:26
VLAI?
Summary
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:26:46.508Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://secunia.com/secunia_research/2006-73/advisory/"
},
{
"name": "2022",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/2022"
},
{
"name": "21492",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21492"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "mailenable-bounds-imap-bo(30796)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796"
},
{
"name": "23201",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23201"
},
{
"name": "20061211 Secunia Research: MailEnable IMAP Service Buffer OverflowVulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-12-08T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"shortName": "flexera"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://secunia.com/secunia_research/2006-73/advisory/"
},
{
"name": "2022",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/2022"
},
{
"name": "21492",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21492"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "mailenable-bounds-imap-bo(30796)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796"
},
{
"name": "23201",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23201"
},
{
"name": "20061211 Secunia Research: MailEnable IMAP Service Buffer OverflowVulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-6423",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://secunia.com/secunia_research/2006-73/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-73/advisory/"
},
{
"name": "2022",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2022"
},
{
"name": "21492",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21492"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "mailenable-bounds-imap-bo(30796)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30796"
},
{
"name": "23201",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23201"
},
{
"name": "20061211 Secunia Research: MailEnable IMAP Service Buffer OverflowVulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/454075/100/0/threaded"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"assignerShortName": "flexera",
"cveId": "CVE-2006-6423",
"datePublished": "2006-12-12T02:00:00",
"dateReserved": "2006-12-09T00:00:00",
"dateUpdated": "2024-08-07T20:26:46.508Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6290 (GCVE-0-2006-6290)
Vulnerability from nvd – Published: 2006-12-05 11:00 – Updated: 2024-08-07 20:19
VLAI?
Summary
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:19:35.175Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1017276",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017276"
},
{
"name": "ADV-2006-4778",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/4778"
},
{
"name": "23080",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23080"
},
{
"name": "21362",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21362"
},
{
"name": "1017319",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017319"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2006-4673",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/4673"
},
{
"name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
},
{
"name": "23047",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23047"
},
{
"name": "mailenable-meimaps-bo(30614)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://secunia.com/secunia_research/2006-71/advisory/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-11-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1017276",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017276"
},
{
"name": "ADV-2006-4778",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/4778"
},
{
"name": "23080",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23080"
},
{
"name": "21362",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21362"
},
{
"name": "1017319",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017319"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2006-4673",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/4673"
},
{
"name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
},
{
"name": "23047",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23047"
},
{
"name": "mailenable-meimaps-bo(30614)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://secunia.com/secunia_research/2006-71/advisory/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6290",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1017276",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017276"
},
{
"name": "ADV-2006-4778",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4778"
},
{
"name": "23080",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23080"
},
{
"name": "21362",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21362"
},
{
"name": "1017319",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017319"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2006-4673",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4673"
},
{
"name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
},
{
"name": "23047",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23047"
},
{
"name": "mailenable-meimaps-bo(30614)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
},
{
"name": "http://secunia.com/secunia_research/2006-71/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-71/advisory/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-6290",
"datePublished": "2006-12-05T11:00:00",
"dateReserved": "2006-12-05T00:00:00",
"dateUpdated": "2024-08-07T20:19:35.175Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}