Lucene search

K

6 matches found

CVE
CVE
added 2023/01/06 10:15 a.m.168 views

CVE-2022-45787

Unproper laxist permissions on the temporary files used by MIME4J TempFileStorageProvider may lead to information disclosure to other local users. This issue affects Apache James MIME4J version 0.8.8 and prior versions. We recommend users to upgrade to MIME4j version 0.8.9 or later.

5.5CVSS6AI score0.00006EPSS
CVE
CVE
added 2022/01/04 9:15 a.m.107 views

CVE-2021-38542

Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information.

5.9CVSS6.1AI score0.00632EPSS
CVE
CVE
added 2022/01/04 9:15 a.m.77 views

CVE-2021-40525

Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulnerable to path traversal, allowing reading and writing any file. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade. Distributed and Cassandra based products...

9.1CVSS6.4AI score0.03826EPSS
CVE
CVE
added 2022/01/04 9:15 a.m.70 views

CVE-2021-40110

In Apache James, using Jazzer fuzzer, we identified that an IMAP user can craft IMAP LIST commands to orchestrate a Denial Of Service using a vulnerable Regular expression. This affected Apache James prior to 3.6.1 We recommend upgrading to Apache James 3.6.1 or higher , which enforce the use of RE...

7.5CVSS7.6AI score0.0078EPSS
CVE
CVE
added 2022/01/04 9:15 a.m.62 views

CVE-2021-40111

In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs...

6.5CVSS6.3AI score0.00559EPSS
CVE
CVE
added 2023/04/03 8:15 a.m.58 views

CVE-2023-26269

Apache James server version 3.7.3 and earlier provides a JMX management service without authentication by default. This allows privilege escalation by amalicious local user. Administrators are advised to disable JMX, or set up a JMX password. Note that version 3.7.4 onward will set up a JMX passwor...

7.8CVSS7.8AI score0.01387EPSS