Mailenable

Mailenable Enterprise

29 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 5.19%
  • Veröffentlicht 10.03.2008 23:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The IMAP service (MEIMAPS.exe) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allows remote attackers to cause a denial of service (crash) via (1) SEARCH and (2) APPEND commands without required arguments, which triggers a...

Exploit
  • EPSS 13.15%
  • Veröffentlicht 10.03.2008 23:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, an...

  • EPSS 33.09%
  • Veröffentlicht 10.03.2008 23:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN...

Exploit
  • EPSS 5.43%
  • Veröffentlicht 07.03.2007 00:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Stack-based buffer overflow in the IMAP service in MailEnable Enterprise and Professional Editions 2.37 and earlier allows remote authenticated users to execute arbitrary code via a long argument to the APPEND command. NOTE: this is probably differe...

  • EPSS 0.52%
  • Veröffentlicht 12.02.2007 11:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. ...

  • EPSS 51.97%
  • Veröffentlicht 19.12.2006 19:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long ar...

  • EPSS 2.89%
  • Veröffentlicht 12.12.2006 20:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors ...

  • EPSS 47.44%
  • Veröffentlicht 12.12.2006 02:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via ...

  • EPSS 2.08%
  • Veröffentlicht 05.12.2006 11:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denia...

  • EPSS 5.41%
  • Veröffentlicht 10.10.2006 04:06:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafte...