Vulnerabilities > Seattle LAB Software > Slmail

DATE CVE VULNERABILITY TITLE RISK
2003-05-27 CVE-2003-0264 Unspecified vulnerability in Seattle LAB Software Slmail 5.1.0.4420
Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.
network
low complexity
seattle-lab-software
7.5
1999-02-25 CVE-1999-0380 Unspecified vulnerability in Seattle LAB Software Slmail 3.0.2421
SLMail 3.1 and 3.2 allows local users to access any file in the NTFS file system when the Remote Administration Service (RAS) is enabled by setting a user's Finger File to point to the target file, then running finger on the user.
local
low complexity
seattle-lab-software
4.6
1999-01-01 CVE-1999-0231 Unspecified vulnerability in Seattle LAB Software Slmail 2.6
Buffer overflow in IP-Switch IMail and Seattle Labs Slmail 2.6 packages using a long VRFY command, causing a denial of service and possibly remote access.
network
low complexity
seattle-lab-software
5.0
1998-07-09 CVE-1999-0102 Unspecified vulnerability in Seattle LAB Software Slmail 3.0.2421
Buffer overflow in SLmail 3.x allows attackers to execute commands using a large FROM line.
network
low complexity
seattle-lab-software
7.5