Vulnerabilities > Seattle LAB Software
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2008-04-07 | CVE-2008-1691 | Improper Input Validation vulnerability in Seattle LAB Software Slmail PRO Unspecified vulnerability in SLMail.exe in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (UDP service outage) via a large packet to UDP port 54. | 5.0 |
2008-04-07 | CVE-2008-1690 | Resource Management Errors vulnerability in Seattle LAB Software Slmail PRO WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a long URI in HTTP requests to TCP port 801. | 10.0 |
2008-04-07 | CVE-2008-1689 | Resource Management Errors vulnerability in Seattle LAB Software Slmail PRO Stack consumption vulnerability in WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (daemon crash) via a long request header in an HTTP request to TCP port 801. | 5.0 |
2008-01-09 | CVE-2008-0152 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Seattle LAB Software Slnet RF Telnet Server SLnet.exe in SeattleLab SLNet RF Telnet Server 4.1.1.3758 and earlier allows user-assisted remote attackers to cause a denial of service (crash) via unspecified telnet options, which triggers a NULL pointer dereference. | 4.3 |
2004-11-23 | CVE-2004-0357 | Buffer Overflow vulnerability in Seattle LAB Software Slmail PRO 2.0.9 Stack-based buffer overflows in SL Mail Pro 2.0.9 allow remote attackers to execute arbitrary code via (1) user.dll, (2) loadpageadmin.dll or (3) loadpageuser.dll. | 10.0 |
2004-11-23 | CVE-2004-0356 | Remote Buffer Overflow vulnerability in Seattle Lab Software SLMail Pro Stack-based buffer overflow in Supervisor Report Center in SL Mail Pro 2.0.9 and earlier allows remote attackers to execute arbitrary code via an HTTP request with a long HTTP sub-version. | 10.0 |
2003-05-27 | CVE-2003-0264 | Unspecified vulnerability in Seattle LAB Software Slmail 5.1.0.4420 Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server. | 7.5 |
2000-05-15 | CVE-2000-0397 | Unspecified vulnerability in Seattle LAB Software Emurl 2.0 The EMURL web-based email account software encodes predictable identifiers in user session URLs, which allows a remote attacker to access a user's email account. | 5.0 |
1999-07-28 | CVE-1999-1017 | Unspecified vulnerability in Seattle LAB Software Emurl Seattle Labs Emurl 2.0, and possibly earlier versions, stores e-mail attachments in a specific directory with scripting enabled, which allows a malicious ASP file attachment to execute when the recipient opens the message. | 7.5 |
1999-02-25 | CVE-1999-0380 | Unspecified vulnerability in Seattle LAB Software Slmail 3.0.2421 SLMail 3.1 and 3.2 allows local users to access any file in the NTFS file system when the Remote Administration Service (RAS) is enabled by setting a user's Finger File to point to the target file, then running finger on the user. | 4.6 |