
CVE-2006-2346
https://notcve.org/view.php?id=CVE-2006-2346
12 May 2006 — vpopmail 5.4.14 and 5.4.15, with cleartext passwords enabled, allows remote attackers to authenticate to an account that does not have a cleartext password set by using a blank password to (1) SMTP AUTH or (2) APOP. • http://secunia.com/advisories/19987 •

CVE-2004-2238
https://notcve.org/view.php?id=CVE-2004-2238
31 Dec 2004 — Format string vulnerability in vsybase.c in vpopmail 5.4.2 and earlier has unknown impact and attack vectors. NOTE: in a followup post, it was observed that the source code used constants that, when compiled, became static format strings. Thus this is not a vulnerability • http://archives.neohapsis.com/archives/bugtraq/2004-08/0226.html •

CVE-2004-2239
https://notcve.org/view.php?id=CVE-2004-2239
31 Dec 2004 — Buffer overflow in vsybase.c in vpopmail 5.4.2 and earlier might allow attackers to cause a denial of service or execute arbitrary code. • http://archives.neohapsis.com/archives/bugtraq/2004-08/0226.html •

CVE-2001-0990
https://notcve.org/view.php?id=CVE-2001-0990
04 Sep 2001 — Inter7 vpopmail 4.10.35 and earlier, when using the MySQL module, compiles authentication information in cleartext into the libvpopmail.a library, which allows local users to obtain the MySQL username and password by inspecting the vpopmail programs that use the library. • http://www.inter7.com/vpopmail/ChangeLog •

CVE-2000-0583
https://notcve.org/view.php?id=CVE-2000-0583
30 Jun 2000 — vchkpw program in vpopmail before version 4.8 does not properly cleanse an untrusted format string used in a call to syslog, which allows remote attackers to cause a denial of service via a USER or PASS command that contains arbitrary formatting directives. • http://www.securityfocus.com/bid/1418 •

CVE-2000-0091 – Inter7 vpopmail (vchkpw) 3.4.11 - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2000-0091
21 Jan 2000 — Buffer overflow in vchkpw/vpopmail POP authentication package allows remote attackers to gain root privileges via a long username or password. • https://www.exploit-db.com/exploits/19727 •