Search criteria
21 vulnerabilities found for mailenable_standard by mailenable
FKIE_CVE-2008-1275
Vulnerability from fkie_nvd - Published: 2008-03-10 23:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_enterprise | * | |
| mailenable | mailenable_professional | * | |
| mailenable | mailenable_standard | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDBCAC5-9215-487B-BFC1-A55982352714",
"versionEndIncluding": "3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
"matchCriteriaId": "77ED3854-23DD-4153-8A40-F26F975CAE72",
"versionEndIncluding": "3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B924438E-5E77-43D5-873C-70F1B2FE4191",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades no especificadas en el servicio SMTP de MailEnable Standard Edition 1.x, Professional Edition 3.x y anteriores, y Enterprise Edition 3.x y anteriores, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante los comandos manipulados (1) EXPN o (2) VRFY."
}
],
"id": "CVE-2008-1275",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-03-10T23:44:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29300"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/28154"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/29300"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/28154"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/5235"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-6997
Vulnerability from fkie_nvd - Published: 2007-02-12 11:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_enterprise | 1.0 | |
| mailenable | mailenable_enterprise | 1.00 | |
| mailenable | mailenable_enterprise | 1.1 | |
| mailenable | mailenable_enterprise | 1.01 | |
| mailenable | mailenable_enterprise | 1.02 | |
| mailenable | mailenable_enterprise | 1.2 | |
| mailenable | mailenable_enterprise | 1.03 | |
| mailenable | mailenable_enterprise | 1.04 | |
| mailenable | mailenable_standard | 1.71 | |
| mailenable | mailenable_standard | 1.72 | |
| mailenable | mailenable_standard | 1.701 | |
| mailenable | mailenable_standard | 1.702 | |
| mailenable | mailenable_standard | 1.703 | |
| mailenable | mailenable_standard | 1.704 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1E228B31-0D62-41E3-A475-550BBFAA4336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
"matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
"matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
"matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*",
"matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*",
"matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*",
"matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*",
"matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*",
"matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*",
"matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en la caracter\u00edstica cryptographic en MailEnable Standard Edition anetrior a 1.93, Professional Edition anterior a 1.73, y Enterprise Edition anterior a 1.21 lleva a \"validaci\u00f3n de seguridad debil\" con un impacto desconocido y vectores de ataque, NOTA: debido a la escasez de detalles, no es\u00e1 claro si esto es lo mismo que CVE-2006-1792."
}
],
"id": "CVE-2006-6997",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-02-12T11:28:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mailenable.com/standardhistory.asp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-6605
Vulnerability from fkie_nvd - Published: 2006-12-19 19:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_enterprise | * | |
| mailenable | mailenable_enterprise | 1.41 | |
| mailenable | mailenable_professional | * | |
| mailenable | mailenable_professional | 1.84 | |
| mailenable | mailenable_standard | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D4ECC9C-9D19-41F8-8A9A-86CDAAF591AB",
"versionEndIncluding": "2.35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "D83D1EA7-A3D6-41AA-B922-18885328D292",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7173C4E7-ACB7-4277-B4E8-79E655B97EEF",
"versionEndIncluding": "2.35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*",
"matchCriteriaId": "201B610A-DD27-48D2-A3EF-DFEBBDEA04BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7AAE8D3D-FF57-49B1-AE03-3ADB815A5DE8",
"versionEndIncluding": "1.98",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en el servicio POP de MailEnable Standard 1.98 y anteriores ; Professional 1.84, y 2.35 y anteriores; y Enterprise 1.41, y 2.35 y anteriores a ME-10026 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un argumento largo al comando PASS."
}
],
"id": "CVE-2006-6605",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-12-19T19:28:00.000",
"references": [
{
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/23127"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://securityreason.com/securityalert/2053"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://securitytracker.com/id?1017395"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://www.securityfocus.com/bid/21645"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://www.vupen.com/english/advisories/2006/5052"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/23127"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/2053"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1017395"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/21645"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
],
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-4616
Vulnerability from fkie_nvd - Published: 2006-09-07 00:04 - Updated: 2025-04-03 01:03
Severity ?
Summary
SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_enterprise | * | |
| mailenable | mailenable_professional | * | |
| mailenable | mailenable_standard | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "794B82C8-E0B2-4B79-BF36-3FB9E09AE5FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F99747EE-1CD0-4DD1-93BD-ACA95EC5B2CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B924438E-5E77-43D5-873C-70F1B2FE4191",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception."
},
{
"lang": "es",
"value": "El servicio SMTP en MailEnable Standard, Professional, y Enterprise anterior a ME-10014 (04/09/2006) permite a un atacante remoto provocar denegaci\u00f3n de servicio a trav\u00e9s de una b\u00fasqueda SPF para un dominio con un gran n\u00famero de registros, lo cual dispara una excepci\u00f3n de puntero nulo."
}
],
"id": "CVE-2006-4616",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-09-07T00:04:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/21998"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1016792"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/20091"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/3669"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21998"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1016792"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/20091"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/3669"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-1792
Vulnerability from fkie_nvd - Published: 2006-04-15 10:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
"matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
"matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
"matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*",
"matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*",
"matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*",
"matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*",
"matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*",
"matchCriteriaId": "93A9222A-6F22-40BD-8411-69A90E8E46AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*",
"matchCriteriaId": "6F4AADE9-F3FB-4272-8026-58FC677D3F3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*",
"matchCriteriaId": "9DD53801-B8F7-4AE8-BA2B-AC6297340CB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "34E00689-F421-4B3B-96D7-14DC66DB42B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "51B4AA11-F7A1-4297-B6B7-68A815FCE189",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*",
"matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*",
"matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "E1517796-B826-40A3-9654-3BA1DA4E4CC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "735523E7-25D9-4541-B389-D1098052F841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.93:*:*:*:*:*:*:*",
"matchCriteriaId": "E67F8892-2A24-4EF4-ABFA-E7651DF4C5E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*",
"matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*",
"matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*",
"matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*",
"matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
}
],
"id": "CVE-2006-1792",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-04-15T10:02:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"source": "cve@mitre.org",
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"source": "cve@mitre.org",
"url": "http://www.mailenable.com/standardhistory.asp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-2223
Vulnerability from fkie_nvd - Published: 2005-07-12 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_professional | 1.2 | |
| mailenable | mailenable_professional | 1.2a | |
| mailenable | mailenable_professional | 1.5 | |
| mailenable | mailenable_professional | 1.17 | |
| mailenable | mailenable_professional | 1.18 | |
| mailenable | mailenable_professional | 1.19 | |
| mailenable | mailenable_professional | 1.51 | |
| mailenable | mailenable_professional | 1.52 | |
| mailenable | mailenable_professional | 1.53 | |
| mailenable | mailenable_professional | 1.54 | |
| mailenable | mailenable_standard | 1.8 | |
| mailenable | mailenable_standard | 1.71 | |
| mailenable | mailenable_standard | 1.72 | |
| mailenable | mailenable_standard | 1.701 | |
| mailenable | mailenable_standard | 1.702 | |
| mailenable | mailenable_standard | 1.703 | |
| mailenable | mailenable_standard | 1.704 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*",
"matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*",
"matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*",
"matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*",
"matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "34E00689-F421-4B3B-96D7-14DC66DB42B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*",
"matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*",
"matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*",
"matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*",
"matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*",
"matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*",
"matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication."
}
],
"id": "CVE-2005-2223",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-07-12T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1014427"
},
{
"source": "cve@mitre.org",
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"source": "cve@mitre.org",
"url": "http://www.mailenable.com/standardhistory.asp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1014427"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-0804
Vulnerability from fkie_nvd - Published: 2005-05-02 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mailenable | mailenable_standard | 1.8 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "34E00689-F421-4B3B-96D7-14DC66DB42B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field."
}
],
"id": "CVE-2005-0804",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-05-02T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://secunia.com/advisories/14627"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/12833"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://secunia.com/advisories/14627"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/12833"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2008-1275 (GCVE-0-2008-1275)
Vulnerability from cvelistv5 – Published: 2008-03-10 23:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:34.526Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "5235",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"name": "mailenable-expn-vrfy-dos(41083)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"name": "28154",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28154"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2008-0800",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"name": "29300",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29300"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "5235",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"name": "mailenable-expn-vrfy-dos(41083)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"name": "28154",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28154"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2008-0800",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"name": "29300",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29300"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1275",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "5235",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"name": "mailenable-expn-vrfy-dos(41083)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"name": "28154",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28154"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2008-0800",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"name": "29300",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29300"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1275",
"datePublished": "2008-03-10T23:00:00",
"dateReserved": "2008-03-10T00:00:00",
"dateUpdated": "2024-08-07T08:17:34.526Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6997 (GCVE-0-2006-6997)
Vulnerability from cvelistv5 – Published: 2007-02-12 11:00 – Updated: 2024-09-17 02:33
VLAI?
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:50:05.730Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2007-02-12T11:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6997",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mailenable.com/professionalhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"name": "http://www.mailenable.com/enterprisehistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"name": "http://www.mailenable.com/standardhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/standardhistory.asp"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-6997",
"datePublished": "2007-02-12T11:00:00Z",
"dateReserved": "2007-02-12T00:00:00Z",
"dateUpdated": "2024-09-17T02:33:03.597Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6605 (GCVE-0-2006-6605)
Vulnerability from cvelistv5 – Published: 2006-12-19 19:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:33:59.771Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1017395",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017395"
},
{
"name": "23127",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23127"
},
{
"name": "2053",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/2053"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "21645",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21645"
},
{
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name": "ADV-2006-5052",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-12-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"shortName": "flexera"
},
"references": [
{
"name": "1017395",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017395"
},
{
"name": "23127",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23127"
},
{
"name": "2053",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/2053"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "21645",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21645"
},
{
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name": "ADV-2006-5052",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-6605",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1017395",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017395"
},
{
"name": "23127",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23127"
},
{
"name": "2053",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2053"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "21645",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21645"
},
{
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"name": "http://secunia.com/secunia_research/2006-75/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name": "ADV-2006-5052",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"assignerShortName": "flexera",
"cveId": "CVE-2006-6605",
"datePublished": "2006-12-19T19:00:00",
"dateReserved": "2006-12-17T00:00:00",
"dateUpdated": "2024-08-07T20:33:59.771Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-4616 (GCVE-0-2006-4616)
Vulnerability from cvelistv5 – Published: 2006-09-07 00:00 – Updated: 2024-08-07 19:14
VLAI?
Summary
SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:14:47.795Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2006-3669",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3669"
},
{
"name": "1016792",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016792"
},
{
"name": "mailenable-spf-dos(28910)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "20091",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/20091"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
},
{
"name": "21998",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21998"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-09-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2006-3669",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3669"
},
{
"name": "1016792",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016792"
},
{
"name": "mailenable-spf-dos(28910)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "20091",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/20091"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
},
{
"name": "21998",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21998"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4616",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2006-3669",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3669"
},
{
"name": "1016792",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016792"
},
{
"name": "mailenable-spf-dos(28910)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "20091",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20091"
},
{
"name": "http://www.mailenable.com/hotfix/MESMTPC.ZIP",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
},
{
"name": "21998",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21998"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4616",
"datePublished": "2006-09-07T00:00:00",
"dateReserved": "2006-09-06T00:00:00",
"dateUpdated": "2024-08-07T19:14:47.795Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-1792 (GCVE-0-2006-1792)
Vulnerability from cvelistv5 – Published: 2006-04-15 10:00 – Updated: 2024-09-17 00:56
VLAI?
Summary
Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T17:27:28.764Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2006-04-15T10:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-1792",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mailenable.com/professionalhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"name": "http://www.mailenable.com/enterprisehistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "http://www.mailenable.com/standardhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/standardhistory.asp"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-1792",
"datePublished": "2006-04-15T10:00:00Z",
"dateReserved": "2006-04-15T00:00:00Z",
"dateUpdated": "2024-09-17T00:56:41.477Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-2223 (GCVE-0-2005-2223)
Vulnerability from cvelistv5 – Published: 2005-07-12 04:00 – Updated: 2024-09-17 03:28
VLAI?
Summary
Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:22:47.692Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"name": "1014427",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1014427"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-07-12T04:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"name": "1014427",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1014427"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-2223",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mailenable.com/professionalhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"name": "1014427",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014427"
},
{
"name": "http://www.mailenable.com/standardhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/standardhistory.asp"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-2223",
"datePublished": "2005-07-12T04:00:00Z",
"dateReserved": "2005-07-12T00:00:00Z",
"dateUpdated": "2024-09-17T03:28:28.078Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-0804 (GCVE-0-2005-0804)
Vulnerability from cvelistv5 – Published: 2005-03-20 05:00 – Updated: 2024-08-07 21:28
VLAI?
Summary
Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T21:28:28.748Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
},
{
"name": "14627",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/14627"
},
{
"name": "12833",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/12833"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-03-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-10-17T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
},
{
"name": "14627",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/14627"
},
{
"name": "12833",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/12833"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-0804",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
},
{
"name": "14627",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14627"
},
{
"name": "12833",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12833"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-0804",
"datePublished": "2005-03-20T05:00:00",
"dateReserved": "2005-03-20T00:00:00",
"dateUpdated": "2024-08-07T21:28:28.748Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-1275 (GCVE-0-2008-1275)
Vulnerability from nvd – Published: 2008-03-10 23:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:17:34.526Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "5235",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"name": "mailenable-expn-vrfy-dos(41083)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"name": "28154",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/28154"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2008-0800",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"name": "29300",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29300"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-03-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "5235",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"name": "mailenable-expn-vrfy-dos(41083)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"name": "28154",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/28154"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2008-0800",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"name": "29300",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29300"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1275",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "5235",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"name": "mailenable-expn-vrfy-dos(41083)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"name": "28154",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28154"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2008-0800",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0800/references"
},
{
"name": "29300",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29300"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1275",
"datePublished": "2008-03-10T23:00:00",
"dateReserved": "2008-03-10T00:00:00",
"dateUpdated": "2024-08-07T08:17:34.526Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6997 (GCVE-0-2006-6997)
Vulnerability from nvd – Published: 2007-02-12 11:00 – Updated: 2024-09-17 02:33
VLAI?
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:50:05.730Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2007-02-12T11:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6997",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mailenable.com/professionalhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"name": "http://www.mailenable.com/enterprisehistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
},
{
"name": "http://www.mailenable.com/standardhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/standardhistory.asp"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-6997",
"datePublished": "2007-02-12T11:00:00Z",
"dateReserved": "2007-02-12T00:00:00Z",
"dateUpdated": "2024-09-17T02:33:03.597Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-6605 (GCVE-0-2006-6605)
Vulnerability from nvd – Published: 2006-12-19 19:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:33:59.771Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1017395",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017395"
},
{
"name": "23127",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23127"
},
{
"name": "2053",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/2053"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "21645",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21645"
},
{
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name": "ADV-2006-5052",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-12-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"shortName": "flexera"
},
"references": [
{
"name": "1017395",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017395"
},
{
"name": "23127",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23127"
},
{
"name": "2053",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/2053"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "21645",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21645"
},
{
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name": "ADV-2006-5052",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-6605",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1017395",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017395"
},
{
"name": "23127",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23127"
},
{
"name": "2053",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/2053"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "21645",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21645"
},
{
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
},
{
"name": "http://secunia.com/secunia_research/2006-75/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
},
{
"name": "ADV-2006-5052",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/5052"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"assignerShortName": "flexera",
"cveId": "CVE-2006-6605",
"datePublished": "2006-12-19T19:00:00",
"dateReserved": "2006-12-17T00:00:00",
"dateUpdated": "2024-08-07T20:33:59.771Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-4616 (GCVE-0-2006-4616)
Vulnerability from nvd – Published: 2006-09-07 00:00 – Updated: 2024-08-07 19:14
VLAI?
Summary
SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:14:47.795Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2006-3669",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3669"
},
{
"name": "1016792",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016792"
},
{
"name": "mailenable-spf-dos(28910)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "20091",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/20091"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
},
{
"name": "21998",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21998"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-09-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2006-3669",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3669"
},
{
"name": "1016792",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016792"
},
{
"name": "mailenable-spf-dos(28910)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "20091",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/20091"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
},
{
"name": "21998",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21998"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4616",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2006-3669",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3669"
},
{
"name": "1016792",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016792"
},
{
"name": "mailenable-spf-dos(28910)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "20091",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20091"
},
{
"name": "http://www.mailenable.com/hotfix/MESMTPC.ZIP",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
},
{
"name": "21998",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21998"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4616",
"datePublished": "2006-09-07T00:00:00",
"dateReserved": "2006-09-06T00:00:00",
"dateUpdated": "2024-08-07T19:14:47.795Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-1792 (GCVE-0-2006-1792)
Vulnerability from nvd – Published: 2006-04-15 10:00 – Updated: 2024-09-17 00:56
VLAI?
Summary
Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T17:27:28.764Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2006-04-15T10:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-1792",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mailenable.com/professionalhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"name": "http://www.mailenable.com/enterprisehistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/enterprisehistory.asp"
},
{
"name": "http://www.mailenable.com/standardhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/standardhistory.asp"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-1792",
"datePublished": "2006-04-15T10:00:00Z",
"dateReserved": "2006-04-15T00:00:00Z",
"dateUpdated": "2024-09-17T00:56:41.477Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-2223 (GCVE-0-2005-2223)
Vulnerability from nvd – Published: 2005-07-12 04:00 – Updated: 2024-09-17 03:28
VLAI?
Summary
Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:22:47.692Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"name": "1014427",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1014427"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-07-12T04:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"name": "1014427",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1014427"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mailenable.com/standardhistory.asp"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-2223",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.mailenable.com/professionalhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/professionalhistory.asp"
},
{
"name": "1014427",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014427"
},
{
"name": "http://www.mailenable.com/standardhistory.asp",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/standardhistory.asp"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-2223",
"datePublished": "2005-07-12T04:00:00Z",
"dateReserved": "2005-07-12T00:00:00Z",
"dateUpdated": "2024-09-17T03:28:28.078Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-0804 (GCVE-0-2005-0804)
Vulnerability from nvd – Published: 2005-03-20 05:00 – Updated: 2024-08-07 21:28
VLAI?
Summary
Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T21:28:28.748Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
},
{
"name": "14627",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/14627"
},
{
"name": "12833",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/12833"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-03-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-10-17T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
},
{
"name": "14627",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/14627"
},
{
"name": "12833",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/12833"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-0804",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
},
{
"name": "14627",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14627"
},
{
"name": "12833",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12833"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-0804",
"datePublished": "2005-03-20T05:00:00",
"dateReserved": "2005-03-20T00:00:00",
"dateUpdated": "2024-08-07T21:28:28.748Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}