Vulnerabilities > Seattle LAB Software

DATE CVE VULNERABILITY TITLE RISK
2008-04-07 CVE-2008-1691 Improper Input Validation vulnerability in Seattle LAB Software Slmail PRO
Unspecified vulnerability in SLMail.exe in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (UDP service outage) via a large packet to UDP port 54.
network
low complexity
seattle-lab-software CWE-20
5.0
2008-04-07 CVE-2008-1690 Resource Management Errors vulnerability in Seattle LAB Software Slmail PRO
WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a long URI in HTTP requests to TCP port 801.
network
low complexity
seattle-lab-software CWE-399
critical
10.0
2008-04-07 CVE-2008-1689 Resource Management Errors vulnerability in Seattle LAB Software Slmail PRO
Stack consumption vulnerability in WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (daemon crash) via a long request header in an HTTP request to TCP port 801.
network
low complexity
seattle-lab-software CWE-399
5.0
2008-01-09 CVE-2008-0152 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Seattle LAB Software Slnet RF Telnet Server
SLnet.exe in SeattleLab SLNet RF Telnet Server 4.1.1.3758 and earlier allows user-assisted remote attackers to cause a denial of service (crash) via unspecified telnet options, which triggers a NULL pointer dereference.
4.3
2004-11-23 CVE-2004-0357 Buffer Overflow vulnerability in Seattle LAB Software Slmail PRO 2.0.9
Stack-based buffer overflows in SL Mail Pro 2.0.9 allow remote attackers to execute arbitrary code via (1) user.dll, (2) loadpageadmin.dll or (3) loadpageuser.dll.
network
low complexity
seattle-lab-software
critical
10.0
2004-11-23 CVE-2004-0356 Remote Buffer Overflow vulnerability in Seattle Lab Software SLMail Pro
Stack-based buffer overflow in Supervisor Report Center in SL Mail Pro 2.0.9 and earlier allows remote attackers to execute arbitrary code via an HTTP request with a long HTTP sub-version.
network
low complexity
seattle-lab-software
critical
10.0
2003-05-27 CVE-2003-0264 Unspecified vulnerability in Seattle LAB Software Slmail 5.1.0.4420
Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.
network
low complexity
seattle-lab-software
7.5
2000-05-15 CVE-2000-0397 Unspecified vulnerability in Seattle LAB Software Emurl 2.0
The EMURL web-based email account software encodes predictable identifiers in user session URLs, which allows a remote attacker to access a user's email account.
network
low complexity
seattle-lab-software
5.0
1999-07-28 CVE-1999-1017 Unspecified vulnerability in Seattle LAB Software Emurl
Seattle Labs Emurl 2.0, and possibly earlier versions, stores e-mail attachments in a specific directory with scripting enabled, which allows a malicious ASP file attachment to execute when the recipient opens the message.
network
low complexity
seattle-lab-software
7.5
1999-02-25 CVE-1999-0380 Unspecified vulnerability in Seattle LAB Software Slmail 3.0.2421
SLMail 3.1 and 3.2 allows local users to access any file in the NTFS file system when the Remote Administration Service (RAS) is enabled by setting a user's Finger File to point to the target file, then running finger on the user.
local
low complexity
seattle-lab-software
4.6