cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*
Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands.
Max CVSS
9.0
EPSS Score
18.95%
Published
2008-03-10
Updated
2018-10-11
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
Max CVSS
10.0
EPSS Score
50.82%
Published
2006-12-19
Updated
2018-10-17
Buffer overflow in MailEnable Professional 1.71 and earlier, and Enterprise 1.1 and earlier, allows remote authenticated users to execute arbitrary code via a long IMAP EXAMINE command.
Max CVSS
6.5
EPSS Score
1.39%
Published
2005-12-20
Updated
2016-10-18

CVE-2005-1348

Public exploit
Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header.
Max CVSS
7.5
EPSS Score
89.91%
Published
2005-05-02
Updated
2016-10-18
Buffer overflow in the IMAP service for MailEnable Enterprise 1.04 and earlier and Professional 1.54 allows remote attackers to execute arbitrary code via a long AUTHENTICATE command.
Max CVSS
7.5
EPSS Score
6.49%
Published
2005-05-02
Updated
2017-07-11
Buffer overflow in the IMAP service of MailEnable Professional Edition 1.52 and Enterprise Edition 1.01 allows remote attackers to execute arbitrary code via (1) a long command string or (2) a long string to the MEIMAP service and then terminating the connection.
Max CVSS
7.5
EPSS Score
24.68%
Published
2004-12-31
Updated
2017-07-11
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!