Vulnerabilities > Mailenable > Mailenable Professional > 1.71
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2007-01-29 | CVE-2006-6964 | Information Disclosure vulnerability in MailEnable Professional MailEnable Professional before 1.78 provides a cleartext user password when an administrator edits the user's settings, which allows remote authenticated administrators to obtain sensitive information by viewing the HTML source. | 4.0 |
2006-06-28 | CVE-2006-3277 | Resource Management Errors vulnerability in Mailenable Enterprise and Mailenable Professional The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument. | 5.0 |
2006-04-15 | CVE-2006-1792 | Remote Security vulnerability in Mailenable products Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". | 10.0 |
2006-03-21 | CVE-2006-1338 | Resource Management Errors vulnerability in Mailenable Enterprise and Mailenable Professional Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving "incorrectly encoded quoted-printable emails". | 5.0 |
2006-02-01 | CVE-2006-0503 | Remote Denial of Service vulnerability in MailEnable Professional EXAMINE Command IMAP service in MailEnable Professional Edition before 1.72 allows remote attackers to cause a denial of service (service crash) via unspecified vectors involving the EXAMINE command. | 5.0 |
2005-12-21 | CVE-2005-4456 | IMAP Remote Buffer Overflow vulnerability in MailEnable Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands. | 7.8 |