Apache

James

15 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.86%
  • Veröffentlicht 06.02.2025 12:15:26
  • Zuletzt bearbeitet 29.09.2025 21:43:42

Similarly to CVE-2024-34055, Apache James is vulnerable to denial of service through the abuse of IMAP literals from both authenticated and unauthenticated users, which could be used to cause unbounded memory allocation and very long computations Ve...

  • EPSS 0.25%
  • Veröffentlicht 27.02.2024 14:15:27
  • Zuletzt bearbeitet 05.05.2025 21:02:14

Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to f...

  • EPSS 0.45%
  • Veröffentlicht 27.02.2024 09:15:36
  • Zuletzt bearbeitet 05.05.2025 21:01:52

Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to pre-authentication deserialisation of untrusted data. Given a deserialisation gadjet, this could be leveraged as part of an exploit chain that could result i...

  • EPSS 1.39%
  • Veröffentlicht 03.04.2023 08:15:07
  • Zuletzt bearbeitet 13.02.2025 17:16:11

Apache James server version 3.7.3 and earlier provides a JMX management service without authentication by default. This allows privilege escalation by a malicious local user. Administrators are advised to disable JMX, or set up a JMX password. Not...

  • EPSS 0.01%
  • Veröffentlicht 06.01.2023 10:15:10
  • Zuletzt bearbeitet 09.04.2025 20:15:22

Unproper laxist permissions on the temporary files used by MIME4J TempFileStorageProvider may lead to information disclosure to other local users. This issue affects Apache James MIME4J version 0.8.8 and prior versions. We recommend users to upgrade...

  • EPSS 0.03%
  • Veröffentlicht 06.01.2023 10:15:10
  • Zuletzt bearbeitet 10.04.2025 14:15:24

Usage of temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit. Vulnerable components includes the SMTP stack and IMAP APPEND command. This issue affects Ap...

  • EPSS 1.85%
  • Veröffentlicht 08.09.2022 08:15:07
  • Zuletzt bearbeitet 21.11.2024 06:56:58

Apache James prior to release 3.6.3 and 3.7.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. Fix of CVE-2021-38542, which solved similar problem fron Apache James 3.6.1, is subject to a parser differential and do not ...

  • EPSS 2.92%
  • Veröffentlicht 07.02.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:47:38

Fix of CVE-2021-40525 do not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to user names being pre...

  • EPSS 0.63%
  • Veröffentlicht 04.01.2022 09:15:07
  • Zuletzt bearbeitet 21.11.2024 06:17:23

Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information.

  • EPSS 0.78%
  • Veröffentlicht 04.01.2022 09:15:07
  • Zuletzt bearbeitet 21.11.2024 06:23:35

In Apache James, using Jazzer fuzzer, we identified that an IMAP user can craft IMAP LIST commands to orchestrate a Denial Of Service using a vulnerable Regular expression. This affected Apache James prior to 3.6.1 We recommend upgrading to Apache Ja...