4 results (0.002 seconds)

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

vpopmail 5.4.14 and 5.4.15, with cleartext passwords enabled, allows remote attackers to authenticate to an account that does not have a cleartext password set by using a blank password to (1) SMTP AUTH or (2) APOP. • http://secunia.com/advisories/19987 http://sourceforge.net/project/shownotes.php?release_id=415350 http://www.osvdb.org/25445 http://www.securityfocus.com/bid/17894 http://www.vupen.com/english/advisories/2006/1698 https://exchange.xforce.ibmcloud.com/vulnerabilities/26333 •

CVSS: 5.0EPSS: 0%CPEs: 35EXPL: 0

Format string vulnerability in vsybase.c in vpopmail 5.4.2 and earlier has unknown impact and attack vectors. NOTE: in a followup post, it was observed that the source code used constants that, when compiled, became static format strings. Thus this is not a vulnerability • http://archives.neohapsis.com/archives/bugtraq/2004-08/0226.html http://archives.neohapsis.com/archives/bugtraq/2004-08/0264.html http://archives.neohapsis.com/archives/bugtraq/2004-08/0286.html http://www.osvdb.org/9147 http://www.securityfocus.com/bid/10962 https://exchange.xforce.ibmcloud.com/vulnerabilities/17017 •

CVSS: 7.5EPSS: 0%CPEs: 35EXPL: 0

Buffer overflow in vsybase.c in vpopmail 5.4.2 and earlier might allow attackers to cause a denial of service or execute arbitrary code. • http://archives.neohapsis.com/archives/bugtraq/2004-08/0226.html http://archives.neohapsis.com/archives/bugtraq/2004-08/0264.html http://archives.neohapsis.com/archives/bugtraq/2004-08/0286.html http://www.osvdb.org/9146 http://www.securityfocus.com/bid/10962 https://exchange.xforce.ibmcloud.com/vulnerabilities/17016 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

vchkpw program in vpopmail before version 4.8 does not properly cleanse an untrusted format string used in a call to syslog, which allows remote attackers to cause a denial of service via a USER or PASS command that contains arbitrary formatting directives. • http://www.securityfocus.com/bid/1418 http://www.securityfocus.com/templates/archive.pike?list=1&msg=395BD2A8.5D3396A7%40secureaustin.com http://www.vpopmail.cx/vpopmail-ChangeLog •