Mailenable

Mailenable Enterprise

29 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 12.72%
  • Veröffentlicht 10.10.2006 04:06:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via "the signature field of NTLM Type 1 messages".

  • EPSS 4.98%
  • Veröffentlicht 07.09.2006 00:04:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.

  • EPSS 21.04%
  • Veröffentlicht 28.06.2006 22:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null ...

  • EPSS 0.31%
  • Veröffentlicht 15.04.2006 10:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a...

  • EPSS 3.7%
  • Veröffentlicht 21.03.2006 02:06:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving "incorrectly encoded quoted-printable emails".

  • EPSS 1.62%
  • Veröffentlicht 01.02.2006 22:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Unspecified vulnerability in MailEnable Enterprise Edition before 1.2 allows remote attackers to cause a denial of service (CPU utilization) by viewing "formatted quoted-printable emails" via webmail.

Exploit
  • EPSS 8.63%
  • Veröffentlicht 21.12.2005 11:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several "..." (triple dot) sequences in a UID FETCH command.

Exploit
  • EPSS 5.47%
  • Veröffentlicht 21.12.2005 11:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands...

  • EPSS 3.17%
  • Veröffentlicht 20.12.2005 11:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in MailEnable Professional 1.71 and earlier, and Enterprise 1.1 and earlier, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command.

  • EPSS 0.49%
  • Veröffentlicht 05.12.2005 00:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple unspecified vulnerabilities in MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allow attackers to cause a denial of service (crash) via invalid IMAP commands.