4 results (0.003 seconds)

CVSS: 5.0EPSS: 2%CPEs: 10EXPL: 0

Unspecified vulnerability in Hitachi Groupmax Address Server 7 and earlier, and Groupmax Mail Server 7 and earlier allows remote attackers to cause a denial of service (product "stop") via unspecified vectors involving "unexpected requests". Vulnerabilidad no específica en Hitachi Groupmax Address Server 7 y anteriores, y Groupmax Mail Server 7 y anteriores, permite a acatactes remotos provocar una denegación de servicio (parada del producto) a través de vectores no específicos que implican peticiones no esperadas. • http://secunia.com/advisories/20700 http://securitytracker.com/id?1016338 http://www.hitachi-support.com/security_e/vuls_e/HS06-012_e/index-e.html http://www.osvdb.org/26679 http://www.securityfocus.com/bid/18538 http://www.vupen.com/english/advisories/2006/2456 https://exchange.xforce.ibmcloud.com/vulnerabilities/27344 •

CVSS: 5.0EPSS: 4%CPEs: 4EXPL: 0

The Gmax Mail client in Hitachi Groupmax before 20060426 allows remote attackers to cause a denial of service (application hang or erroneous behavior) via an attachment with an MS-DOS device filename. • http://jvn.jp/jp/JVN%2389344424/index.html http://secunia.com/advisories/19840 http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/01-e.html http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/index-e.html http://www.osvdb.org/24969 http://www.vupen.com/english/advisories/2006/1539 https://exchange.xforce.ibmcloud.com/vulnerabilities/26099 •

CVSS: 7.8EPSS: 1%CPEs: 4EXPL: 0

Hitachi Groupmax Mail SMTP 06-50 through 06-52-/A and 07-00 through 07-20 allows remote attackers to cause a denial of service (service stop) via an e-mail message with an "invalid format." • http://secunia.com/advisories/17635 http://securitytracker.com/alerts/2005/Nov/1015243.html http://www.hitachi-support.com/security_e/vuls_e/HS05-024_e/01-e.html http://www.osvdb.org/20968 http://www.securityfocus.com/bid/15499 http://www.vupen.com/english/advisories/2005/2492 •

CVSS: 5.0EPSS: 24%CPEs: 2EXPL: 0

Multiple vulnerabilities in multiple vendor implementations of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol allow remote attackers to cause a denial of service and possibly execute arbitrary code via an S/MIME email message containing certain unexpected ASN.1 constructs, as demonstrated using the NISSC test suite. Múltiples vulnerabilidades en múltiples implementaciones de fabricantes del protocolo S/MIME (Secure/Multiporpouse Internet Mail Extensions) permiten a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante un mensaje de correo electrónico S/MIME conteniendo ciertas instrucciones ASN.1 inesperadas, como se ha demostrado usando el paquete de pruebas NISSC. • ftp://patches.sgi.com/support/free/security/advisories/20040402-01-U.asc http://marc.info/?l=bugtraq&m=108448379429944&w=2 http://marc.info/?l=bugtraq&m=109900315219363&w=2 http://www.kb.cert.org/vuls/id/428230 http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 http://www.redhat.com/support/errata/RHSA-2004-110.html http://www.redhat.com/support/errata/RHSA-2004-112.html http://www.securityfocus.com/bid/8981 http://www.uniras.gov.uk/vuls/2003& •