Search criteria

21 vulnerabilities found for mailenable_standard by mailenable

FKIE_CVE-2008-1275

Vulnerability from fkie_nvd - Published: 2008-03-10 23:44 - Updated: 2025-04-09 00:30

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDBCAC5-9215-487B-BFC1-A55982352714",
              "versionEndIncluding": "3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77ED3854-23DD-4153-8A40-F26F975CAE72",
              "versionEndIncluding": "3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B924438E-5E77-43D5-873C-70F1B2FE4191",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en el servicio SMTP de MailEnable Standard Edition 1.x, Professional Edition 3.x y anteriores, y Enterprise Edition 3.x y anteriores, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante los comandos manipulados (1) EXPN o (2) VRFY."
    }
  ],
  "id": "CVE-2008-1275",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-10T23:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29300"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/28154"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0800/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5235"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29300"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/28154"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0800/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5235"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-6997

Vulnerability from fkie_nvd - Published: 2007-02-12 11:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E228B31-0D62-41E3-A475-550BBFAA4336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*",
              "matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors.  NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en la caracter\u00edstica cryptographic en MailEnable Standard Edition anetrior a 1.93, Professional Edition anterior a 1.73, y Enterprise Edition anterior a 1.21 lleva a \"validaci\u00f3n de seguridad debil\" con un impacto desconocido y vectores de ataque, NOTA: debido a la escasez de detalles, no es\u00e1 claro si esto es lo mismo que CVE-2006-1792."
    }
  ],
  "id": "CVE-2006-6997",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-02-12T11:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/standardhistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.mailenable.com/standardhistory.asp"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-6605

Vulnerability from fkie_nvd - Published: 2006-12-19 19:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D4ECC9C-9D19-41F8-8A9A-86CDAAF591AB",
              "versionEndIncluding": "2.35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D83D1EA7-A3D6-41AA-B922-18885328D292",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7173C4E7-ACB7-4277-B4E8-79E655B97EEF",
              "versionEndIncluding": "2.35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "201B610A-DD27-48D2-A3EF-DFEBBDEA04BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AAE8D3D-FF57-49B1-AE03-3ADB815A5DE8",
              "versionEndIncluding": "1.98",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en el servicio POP de MailEnable Standard 1.98 y anteriores ; Professional 1.84, y 2.35 y anteriores; y Enterprise 1.41, y 2.35 y anteriores a ME-10026 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un argumento largo al comando PASS."
    }
  ],
  "id": "CVE-2006-6605",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-19T19:28:00.000",
  "references": [
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23127"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-75/advisory/"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://securityreason.com/securityalert/2053"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://securitytracker.com/id?1017395"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/bid/21645"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2006/5052"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23127"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-75/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2053"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017395"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/21645"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/5052"
    }
  ],
  "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-4616

Vulnerability from fkie_nvd - Published: 2006-09-07 00:04 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "794B82C8-E0B2-4B79-BF36-3FB9E09AE5FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F99747EE-1CD0-4DD1-93BD-ACA95EC5B2CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B924438E-5E77-43D5-873C-70F1B2FE4191",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception."
    },
    {
      "lang": "es",
      "value": "El servicio SMTP en MailEnable Standard, Professional, y Enterprise anterior a ME-10014 (04/09/2006) permite a un atacante remoto provocar denegaci\u00f3n de servicio a trav\u00e9s de una b\u00fasqueda SPF para un dominio con un gran n\u00famero de registros, lo cual dispara una excepci\u00f3n de puntero nulo."
    }
  ],
  "id": "CVE-2006-4616",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-09-07T00:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21998"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016792"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/20091"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3669"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21998"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016792"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/20091"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3669"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-1792

Vulnerability from fkie_nvd - Published: 2006-04-15 10:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F83EAD-9296-4A24-BF7F-905CC93FEADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7BAC3EA-3267-4AE2-A172-3B8D63B09B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE40F5BA-6174-4959-BFD1-CCECAB138009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA6DCAFE-CAC2-4B36-B3E1-FA2B490424EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A9222A-6F22-40BD-8411-69A90E8E46AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F4AADE9-F3FB-4272-8026-58FC677D3F3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD53801-B8F7-4AE8-BA2B-AC6297340CB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E00689-F421-4B3B-96D7-14DC66DB42B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B4AA11-F7A1-4297-B6B7-68A815FCE189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1517796-B826-40A3-9654-3BA1DA4E4CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "735523E7-25D9-4541-B389-D1098052F841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "E67F8892-2A24-4EF4-ABFA-E7651DF4C5E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*",
              "matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\".  NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
    }
  ],
  "id": "CVE-2006-1792",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-04-15T10:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mailenable.com/standardhistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mailenable.com/enterprisehistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mailenable.com/standardhistory.asp"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-2223

Vulnerability from fkie_nvd - Published: 2005-07-12 04:00 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CFAF9C8-DB67-446E-B63C-530CB0C170B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F30383-D23F-4CA5-BC02-7716398BC042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADEF40C-4C56-4893-B757-15966ED5A925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F32956E6-A13B-4663-BBC9-FEB08A1DCC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AABE2F0-FEC1-4BDE-B1C0-92FF2CEA48E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "652F54CA-1CCA-4BC9-8728-A0F6FABF8817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "269BCB9D-9AEF-40E2-8291-50EC2A083775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "88435083-D7A8-4679-BEB1-4B6526454C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "145A8B1A-573D-4695-B66A-FF8EA2556DC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9572349-9433-415F-B81B-10A1375AF33F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E00689-F421-4B3B-96D7-14DC66DB42B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1FBE144-CB33-4726-B8E6-52CA42BE7C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A6721E-E25B-4502-892A-46054D920C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A4FCCB-D0CC-4B53-AAF0-F338950B05F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB172967-4C1A-4E5E-9B10-606CD185E495",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E2BEE2-6FBE-43B4-90AA-590D7CAEDA6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*",
              "matchCriteriaId": "83A071CC-3210-4D98-A5D3-82FBCB29C657",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication."
    }
  ],
  "id": "CVE-2005-2223",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-07-12T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1014427"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mailenable.com/standardhistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1014427"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mailenable.com/professionalhistory.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mailenable.com/standardhistory.asp"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-0804

Vulnerability from fkie_nvd - Published: 2005-05-02 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field.
Impacted products
Vendor Product Version
mailenable mailenable_standard 1.8

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mailenable:mailenable_standard:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E00689-F421-4B3B-96D7-14DC66DB42B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field."
    }
  ],
  "id": "CVE-2005-0804",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/14627"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/12833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/14627"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/12833"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2008-1275 (GCVE-0-2008-1275)

Vulnerability from cvelistv5 – Published: 2008-03-10 23:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.exploit-db.com/exploits/5235 exploitx_refsource_EXPLOIT-DB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/28154 vdb-entryx_refsource_BID
http://www.mailenable.com/hotfix/ x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/0800… vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/29300 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.526Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "5235",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5235"
          },
          {
            "name": "mailenable-expn-vrfy-dos(41083)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
          },
          {
            "name": "28154",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28154"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "ADV-2008-0800",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0800/references"
          },
          {
            "name": "29300",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29300"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "5235",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5235"
        },
        {
          "name": "mailenable-expn-vrfy-dos(41083)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
        },
        {
          "name": "28154",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28154"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "ADV-2008-0800",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0800/references"
        },
        {
          "name": "29300",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29300"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1275",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "5235",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5235"
            },
            {
              "name": "mailenable-expn-vrfy-dos(41083)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
            },
            {
              "name": "28154",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28154"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "ADV-2008-0800",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0800/references"
            },
            {
              "name": "29300",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29300"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1275",
    "datePublished": "2008-03-10T23:00:00",
    "dateReserved": "2008-03-10T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.526Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6997 (GCVE-0-2006-6997)

Vulnerability from cvelistv5 – Published: 2007-02-12 11:00 – Updated: 2024-09-17 02:33
VLAI?
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:50:05.730Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/professionalhistory.asp"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/enterprisehistory.asp"
          },
          {
            "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/standardhistory.asp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors.  NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-02-12T11:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/professionalhistory.asp"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/enterprisehistory.asp"
        },
        {
          "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/standardhistory.asp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6997",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors.  NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mailenable.com/professionalhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/professionalhistory.asp"
            },
            {
              "name": "http://www.mailenable.com/enterprisehistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/enterprisehistory.asp"
            },
            {
              "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
            },
            {
              "name": "http://www.mailenable.com/standardhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/standardhistory.asp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6997",
    "datePublished": "2007-02-12T11:00:00Z",
    "dateReserved": "2007-02-12T00:00:00Z",
    "dateUpdated": "2024-09-17T02:33:03.597Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6605 (GCVE-0-2006-6605)

Vulnerability from cvelistv5 – Published: 2006-12-19 19:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1017395 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/23127 third-party-advisoryx_refsource_SECUNIA
http://securityreason.com/securityalert/2053 third-party-advisoryx_refsource_SREASON
http://www.mailenable.com/hotfix/ x_refsource_CONFIRM
http://www.securityfocus.com/bid/21645 vdb-entryx_refsource_BID
http://www.securityfocus.com/archive/1/454713/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/secunia_research/2006-75/advisory/ x_refsource_MISC
http://www.vupen.com/english/advisories/2006/5052 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:33:59.771Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1017395",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017395"
          },
          {
            "name": "23127",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23127"
          },
          {
            "name": "2053",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2053"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "21645",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21645"
          },
          {
            "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-75/advisory/"
          },
          {
            "name": "ADV-2006-5052",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/5052"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
        "shortName": "flexera"
      },
      "references": [
        {
          "name": "1017395",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017395"
        },
        {
          "name": "23127",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23127"
        },
        {
          "name": "2053",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2053"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "21645",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21645"
        },
        {
          "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-75/advisory/"
        },
        {
          "name": "ADV-2006-5052",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/5052"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
          "ID": "CVE-2006-6605",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1017395",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017395"
            },
            {
              "name": "23127",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23127"
            },
            {
              "name": "2053",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2053"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "21645",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21645"
            },
            {
              "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-75/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-75/advisory/"
            },
            {
              "name": "ADV-2006-5052",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/5052"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
    "assignerShortName": "flexera",
    "cveId": "CVE-2006-6605",
    "datePublished": "2006-12-19T19:00:00",
    "dateReserved": "2006-12-17T00:00:00",
    "dateUpdated": "2024-08-07T20:33:59.771Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4616 (GCVE-0-2006-4616)

Vulnerability from cvelistv5 – Published: 2006-09-07 00:00 – Updated: 2024-08-07 19:14
VLAI?
Summary
SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2006/3669 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1016792 vdb-entryx_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.mailenable.com/hotfix/ x_refsource_CONFIRM
http://www.securityfocus.com/bid/20091 vdb-entryx_refsource_BID
http://www.mailenable.com/hotfix/MESMTPC.ZIP x_refsource_CONFIRM
http://secunia.com/advisories/21998 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:14:47.795Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-3669",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3669"
          },
          {
            "name": "1016792",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016792"
          },
          {
            "name": "mailenable-spf-dos(28910)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "20091",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20091"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
          },
          {
            "name": "21998",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21998"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-09-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-3669",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3669"
        },
        {
          "name": "1016792",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016792"
        },
        {
          "name": "mailenable-spf-dos(28910)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "20091",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20091"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
        },
        {
          "name": "21998",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21998"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4616",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-3669",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3669"
            },
            {
              "name": "1016792",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016792"
            },
            {
              "name": "mailenable-spf-dos(28910)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "20091",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20091"
            },
            {
              "name": "http://www.mailenable.com/hotfix/MESMTPC.ZIP",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
            },
            {
              "name": "21998",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21998"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4616",
    "datePublished": "2006-09-07T00:00:00",
    "dateReserved": "2006-09-06T00:00:00",
    "dateUpdated": "2024-08-07T19:14:47.795Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1792 (GCVE-0-2006-1792)

Vulnerability from cvelistv5 – Published: 2006-04-15 10:00 – Updated: 2024-09-17 00:56
VLAI?
Summary
Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:27:28.764Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/professionalhistory.asp"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/enterprisehistory.asp"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/standardhistory.asp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\".  NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-04-15T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/professionalhistory.asp"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/enterprisehistory.asp"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/standardhistory.asp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1792",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\".  NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mailenable.com/professionalhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/professionalhistory.asp"
            },
            {
              "name": "http://www.mailenable.com/enterprisehistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/enterprisehistory.asp"
            },
            {
              "name": "http://www.mailenable.com/standardhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/standardhistory.asp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1792",
    "datePublished": "2006-04-15T10:00:00Z",
    "dateReserved": "2006-04-15T00:00:00Z",
    "dateUpdated": "2024-09-17T00:56:41.477Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2223 (GCVE-0-2005-2223)

Vulnerability from cvelistv5 – Published: 2005-07-12 04:00 – Updated: 2024-09-17 03:28
VLAI?
Summary
Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:22:47.692Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/professionalhistory.asp"
          },
          {
            "name": "1014427",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014427"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/standardhistory.asp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-07-12T04:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/professionalhistory.asp"
        },
        {
          "name": "1014427",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014427"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/standardhistory.asp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2223",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mailenable.com/professionalhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/professionalhistory.asp"
            },
            {
              "name": "1014427",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014427"
            },
            {
              "name": "http://www.mailenable.com/standardhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/standardhistory.asp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2223",
    "datePublished": "2005-07-12T04:00:00Z",
    "dateReserved": "2005-07-12T00:00:00Z",
    "dateUpdated": "2024-09-17T03:28:28.078Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0804 (GCVE-0-2005-0804)

Vulnerability from cvelistv5 – Published: 2005-03-20 05:00 – Updated: 2024-08-07 21:28
VLAI?
Summary
Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=111108519331738&w=2 mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/14627 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/12833 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:28:28.748Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
          },
          {
            "name": "14627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/14627"
          },
          {
            "name": "12833",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12833"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-03-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
        },
        {
          "name": "14627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/14627"
        },
        {
          "name": "12833",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12833"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0804",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
            },
            {
              "name": "14627",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/14627"
            },
            {
              "name": "12833",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12833"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0804",
    "datePublished": "2005-03-20T05:00:00",
    "dateReserved": "2005-03-20T00:00:00",
    "dateUpdated": "2024-08-07T21:28:28.748Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1275 (GCVE-0-2008-1275)

Vulnerability from nvd – Published: 2008-03-10 23:00 – Updated: 2024-08-07 08:17
VLAI?
Summary
Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.exploit-db.com/exploits/5235 exploitx_refsource_EXPLOIT-DB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/28154 vdb-entryx_refsource_BID
http://www.mailenable.com/hotfix/ x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/0800… vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/29300 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.526Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "5235",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5235"
          },
          {
            "name": "mailenable-expn-vrfy-dos(41083)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
          },
          {
            "name": "28154",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28154"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "ADV-2008-0800",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0800/references"
          },
          {
            "name": "29300",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29300"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "5235",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5235"
        },
        {
          "name": "mailenable-expn-vrfy-dos(41083)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
        },
        {
          "name": "28154",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28154"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "ADV-2008-0800",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0800/references"
        },
        {
          "name": "29300",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29300"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1275",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "5235",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5235"
            },
            {
              "name": "mailenable-expn-vrfy-dos(41083)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
            },
            {
              "name": "28154",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28154"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "ADV-2008-0800",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0800/references"
            },
            {
              "name": "29300",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29300"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1275",
    "datePublished": "2008-03-10T23:00:00",
    "dateReserved": "2008-03-10T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.526Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6997 (GCVE-0-2006-6997)

Vulnerability from nvd – Published: 2007-02-12 11:00 – Updated: 2024-09-17 02:33
VLAI?
Summary
Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:50:05.730Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/professionalhistory.asp"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/enterprisehistory.asp"
          },
          {
            "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/standardhistory.asp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors.  NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-02-12T11:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/professionalhistory.asp"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/enterprisehistory.asp"
        },
        {
          "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/standardhistory.asp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6997",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to \"weakened authentication security\" with unknown impact and attack vectors.  NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mailenable.com/professionalhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/professionalhistory.asp"
            },
            {
              "name": "http://www.mailenable.com/enterprisehistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/enterprisehistory.asp"
            },
            {
              "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html"
            },
            {
              "name": "http://www.mailenable.com/standardhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/standardhistory.asp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6997",
    "datePublished": "2007-02-12T11:00:00Z",
    "dateReserved": "2007-02-12T00:00:00Z",
    "dateUpdated": "2024-09-17T02:33:03.597Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6605 (GCVE-0-2006-6605)

Vulnerability from nvd – Published: 2006-12-19 19:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1017395 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/23127 third-party-advisoryx_refsource_SECUNIA
http://securityreason.com/securityalert/2053 third-party-advisoryx_refsource_SREASON
http://www.mailenable.com/hotfix/ x_refsource_CONFIRM
http://www.securityfocus.com/bid/21645 vdb-entryx_refsource_BID
http://www.securityfocus.com/archive/1/454713/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/secunia_research/2006-75/advisory/ x_refsource_MISC
http://www.vupen.com/english/advisories/2006/5052 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:33:59.771Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1017395",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017395"
          },
          {
            "name": "23127",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23127"
          },
          {
            "name": "2053",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2053"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "21645",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21645"
          },
          {
            "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-75/advisory/"
          },
          {
            "name": "ADV-2006-5052",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/5052"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
        "shortName": "flexera"
      },
      "references": [
        {
          "name": "1017395",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017395"
        },
        {
          "name": "23127",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23127"
        },
        {
          "name": "2053",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2053"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "21645",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21645"
        },
        {
          "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-75/advisory/"
        },
        {
          "name": "ADV-2006-5052",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/5052"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
          "ID": "CVE-2006-6605",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1017395",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017395"
            },
            {
              "name": "23127",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23127"
            },
            {
              "name": "2053",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2053"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "21645",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21645"
            },
            {
              "name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-75/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-75/advisory/"
            },
            {
              "name": "ADV-2006-5052",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/5052"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
    "assignerShortName": "flexera",
    "cveId": "CVE-2006-6605",
    "datePublished": "2006-12-19T19:00:00",
    "dateReserved": "2006-12-17T00:00:00",
    "dateUpdated": "2024-08-07T20:33:59.771Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4616 (GCVE-0-2006-4616)

Vulnerability from nvd – Published: 2006-09-07 00:00 – Updated: 2024-08-07 19:14
VLAI?
Summary
SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2006/3669 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1016792 vdb-entryx_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.mailenable.com/hotfix/ x_refsource_CONFIRM
http://www.securityfocus.com/bid/20091 vdb-entryx_refsource_BID
http://www.mailenable.com/hotfix/MESMTPC.ZIP x_refsource_CONFIRM
http://secunia.com/advisories/21998 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:14:47.795Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-3669",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3669"
          },
          {
            "name": "1016792",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016792"
          },
          {
            "name": "mailenable-spf-dos(28910)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/"
          },
          {
            "name": "20091",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20091"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
          },
          {
            "name": "21998",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21998"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-09-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-3669",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3669"
        },
        {
          "name": "1016792",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016792"
        },
        {
          "name": "mailenable-spf-dos(28910)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/"
        },
        {
          "name": "20091",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20091"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
        },
        {
          "name": "21998",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21998"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4616",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-3669",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3669"
            },
            {
              "name": "1016792",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016792"
            },
            {
              "name": "mailenable-spf-dos(28910)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28910"
            },
            {
              "name": "http://www.mailenable.com/hotfix/",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/"
            },
            {
              "name": "20091",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20091"
            },
            {
              "name": "http://www.mailenable.com/hotfix/MESMTPC.ZIP",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/hotfix/MESMTPC.ZIP"
            },
            {
              "name": "21998",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21998"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4616",
    "datePublished": "2006-09-07T00:00:00",
    "dateReserved": "2006-09-06T00:00:00",
    "dateUpdated": "2024-08-07T19:14:47.795Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1792 (GCVE-0-2006-1792)

Vulnerability from nvd – Published: 2006-04-15 10:00 – Updated: 2024-09-17 00:56
VLAI?
Summary
Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:27:28.764Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/professionalhistory.asp"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/enterprisehistory.asp"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/standardhistory.asp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\".  NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-04-15T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/professionalhistory.asp"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/enterprisehistory.asp"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/standardhistory.asp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1792",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\".  NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mailenable.com/professionalhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/professionalhistory.asp"
            },
            {
              "name": "http://www.mailenable.com/enterprisehistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/enterprisehistory.asp"
            },
            {
              "name": "http://www.mailenable.com/standardhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/standardhistory.asp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1792",
    "datePublished": "2006-04-15T10:00:00Z",
    "dateReserved": "2006-04-15T00:00:00Z",
    "dateUpdated": "2024-09-17T00:56:41.477Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2223 (GCVE-0-2005-2223)

Vulnerability from nvd – Published: 2005-07-12 04:00 – Updated: 2024-09-17 03:28
VLAI?
Summary
Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:22:47.692Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/professionalhistory.asp"
          },
          {
            "name": "1014427",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014427"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/standardhistory.asp"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-07-12T04:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/professionalhistory.asp"
        },
        {
          "name": "1014427",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014427"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/standardhistory.asp"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2223",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mailenable.com/professionalhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/professionalhistory.asp"
            },
            {
              "name": "1014427",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014427"
            },
            {
              "name": "http://www.mailenable.com/standardhistory.asp",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/standardhistory.asp"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2223",
    "datePublished": "2005-07-12T04:00:00Z",
    "dateReserved": "2005-07-12T00:00:00Z",
    "dateUpdated": "2024-09-17T03:28:28.078Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0804 (GCVE-0-2005-0804)

Vulnerability from nvd – Published: 2005-03-20 05:00 – Updated: 2024-08-07 21:28
VLAI?
Summary
Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=111108519331738&w=2 mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/14627 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/12833 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:28:28.748Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
          },
          {
            "name": "14627",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/14627"
          },
          {
            "name": "12833",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12833"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-03-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
        },
        {
          "name": "14627",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/14627"
        },
        {
          "name": "12833",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12833"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0804",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20050317 See-security Advisory: Format string vulnerability in MailEnable 1.8",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=111108519331738\u0026w=2"
            },
            {
              "name": "14627",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/14627"
            },
            {
              "name": "12833",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12833"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0804",
    "datePublished": "2005-03-20T05:00:00",
    "dateReserved": "2005-03-20T00:00:00",
    "dateUpdated": "2024-08-07T21:28:28.748Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}