Vulnerabilities > CVE-2006-0928 - Unspecified vulnerability in Argosoft Mail Server 1.8
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN argosoft
nessus
Summary
The POP3 Server in ArGoSoft Mail Server Pro 1.8 allows remote attackers to obtain sensitive information via the _DUMP command, which reveals the operating system, registered user, and registration code.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Misc. |
NASL id | ARGOSOFT_MS_POP3_DUMP.NASL |
description | The remote host is running ArGoSoft Mail Server, a messaging system for Windows. An unauthenticated attacker can gain information about the installed application as well as the remote host itself by sending the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20976 |
published | 2006-02-25 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20976 |
title | ArGoSoft Mail Server _DUMP Command System Information Disclosure |
code |
|
References
- http://secunia.com/advisories/18990
- http://secunia.com/advisories/18990
- http://www.nsag.ru/vuln/879.html
- http://www.nsag.ru/vuln/879.html
- http://www.securityfocus.com/archive/1/425968/100/0/threaded
- http://www.securityfocus.com/archive/1/425968/100/0/threaded
- http://www.securityfocus.com/bid/16808
- http://www.securityfocus.com/bid/16808
- http://www.vupen.com/english/advisories/2006/0733
- http://www.vupen.com/english/advisories/2006/0733