Lucene search

K
MailenableMailenable Professional1.73

6 matches found

CVE
CVE
added 2006/04/15 10:2 a.m.48 views

CVE-2006-1792

Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably ...

10CVSS6.2AI score0.02884EPSS
CVE
CVE
added 2007/02/15 11:28 p.m.44 views

CVE-2007-0652

Cross-site request forgery (CSRF) vulnerability in MailEnable Professional before 2.37 allows remote attackers to modify arbitrary configurations and perform unauthorized actions as arbitrary users via a link or IMG tag.

5.1CVSS6.9AI score0.02105EPSS
CVE
CVE
added 2006/06/28 10:5 p.m.41 views

CVE-2006-3277

The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a lengt...

5CVSS6.9AI score0.17591EPSS
CVE
CVE
added 2006/12/12 8:28 p.m.39 views

CVE-2006-6484

The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addre...

5CVSS6.5AI score0.3773EPSS
CVE
CVE
added 2007/01/29 4:28 p.m.39 views

CVE-2006-6964

MailEnable Professional before 1.78 provides a cleartext user password when an administrator edits the user's settings, which allows remote authenticated administrators to obtain sensitive information by viewing the HTML source.

4CVSS5.8AI score0.00108EPSS
CVE
CVE
added 2007/02/15 11:28 p.m.35 views

CVE-2007-0651

Multiple cross-site scripting (XSS) vulnerabilities in MailEnable Professional before 2.37 allow remote attackers to inject arbitrary Javascript script via (1) e-mail messages and (2) the ID parameter to (a) right.asp, (b) Forms/MAI/list.asp, and (c) Forms/VCF/list.asp in mewebmail/base/default/lan...

4.3CVSS5.9AI score0.02758EPSS