Vulnerabilities > Seattle LAB Software > Slmail
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2003-05-27 | CVE-2003-0264 | Unspecified vulnerability in Seattle LAB Software Slmail 5.1.0.4420 Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server. | 7.5 |
1999-02-25 | CVE-1999-0380 | Unspecified vulnerability in Seattle LAB Software Slmail 3.0.2421 SLMail 3.1 and 3.2 allows local users to access any file in the NTFS file system when the Remote Administration Service (RAS) is enabled by setting a user's Finger File to point to the target file, then running finger on the user. | 4.6 |
1999-01-01 | CVE-1999-0231 | Unspecified vulnerability in Seattle LAB Software Slmail 2.6 Buffer overflow in IP-Switch IMail and Seattle Labs Slmail 2.6 packages using a long VRFY command, causing a denial of service and possibly remote access. | 5.0 |
1998-07-09 | CVE-1999-0102 | Unspecified vulnerability in Seattle LAB Software Slmail 3.0.2421 Buffer overflow in SLmail 3.x allows attackers to execute commands using a large FROM line. | 7.5 |