Vulnerabilities > Mailenable > Mailenable Professional > 2.0

DATE CVE VULNERABILITY TITLE RISK
2007-02-15 CVE-2007-0652 HTML Injection and Cross-Site Scripting vulnerability in MailEnable Web Mail Client
Cross-site request forgery (CSRF) vulnerability in MailEnable Professional before 2.37 allows remote attackers to modify arbitrary configurations and perform unauthorized actions as arbitrary users via a link or IMG tag.
network
high complexity
mailenable
5.1
2007-02-15 CVE-2007-0651 HTML Injection and Cross-Site Scripting vulnerability in MailEnable Web Mail Client
Multiple cross-site scripting (XSS) vulnerabilities in MailEnable Professional before 2.37 allow remote attackers to inject arbitrary Javascript script via (1) e-mail messages and (2) the ID parameter to (a) right.asp, (b) Forms/MAI/list.asp, and (c) Forms/VCF/list.asp in mewebmail/base/default/lang/EN/.
network
mailenable
4.3
2006-12-12 CVE-2006-6484 Remote Denial of Service vulnerability in MailEnable IMAP Service
The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423.
network
low complexity
mailenable
5.0
2006-12-05 CVE-2006-6290 Buffer Overflow vulnerability in MailEnable IMAP Service
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.
network
low complexity
mailenable
6.5
2006-10-10 CVE-2006-5177 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Mailenable Enterprise and Mailenable Professional
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read.
network
mailenable CWE-119
critical
9.3
2006-10-10 CVE-2006-5176 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Mailenable Enterprise and Mailenable Professional
Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via "the signature field of NTLM Type 1 messages".
network
mailenable CWE-119
critical
9.3