Page 10 of 49 results (0.003 seconds)

CVSS: 4.3EPSS: 0%CPEs: 37EXPL: 0

Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name. Vulnerabilidad de escalado de directorio en index/mbox/mbox-storage.c de Dovecot versiones anteriores a 1.0.rc29, cuando se usa la extensión (plugin) zlib, permite a atacantes remotos leer buzones de correo (mbox files) comprimidos con gzip (.gz) de su elección mediante una secuencia .. (punto punto) en el nombre del buzón. • http://dovecot.org/doc/NEWS http://dovecot.org/list/dovecot-cvs/2007-March/008488.html http://dovecot.org/list/dovecot-news/2007-March/000038.html http://secunia.com/advisories/25072 http://secunia.com/advisories/30342 http://www.debian.org/security/2007/dsa-1359 http://www.novell.com/linux/security/advisories/2007_8_sr.html http://www.redhat.com/support/errata/RHSA-2008-0297.html http://www.securityfocus.com/archive/1/466168/100/0/threaded http://www.securityfo •

CVSS: 5.0EPSS: 15%CPEs: 57EXPL: 0

Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file. Desbordamiento de búfer (off-by-one) en Dovecot 1.0test53 hasta 1.0.rc14, y posiblemente otras versiones, cuando se utilizan los archivos de índice y mmap_disable tiene el valor "Sí", permite a usuarios IMAP o POP3 remotos autenticados provocar una denegación de servicio (caída) a través de vectores no especificados relacionados con el archivo de caché. • http://dovecot.org/list/dovecot-news/2006-November/000023.html http://dovecot.org/pipermail/dovecot-news/2006-November/000024.html http://secunia.com/advisories/23007 http://secunia.com/advisories/23150 http://secunia.com/advisories/23172 http://secunia.com/advisories/23213 http://securitytracker.com/id?1017288 http://www.novell.com/linux/security/advisories/2006_73_mono.html http://www.securityfocus.com/archive/1/452081/100/0/threaded http://www.securityfocus.com/bid/21183/inf •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command. • http://dovecot.org/list/dovecot-cvs/2006-May/005563.html http://secunia.com/advisories/20308 http://secunia.com/advisories/20315 http://securityreason.com/securityalert/913 http://www.debian.org/security/2006/dsa-1080 http://www.dovecot.org/list/dovecot-news/2006-May/000006.html http://www.securityfocus.com/archive/1/433878/100/0/threaded http://www.securityfocus.com/bid/17961 http://www.vupen.com/english/advisories/2006/2013 https://exchange.xforce.ibmcloud.com/vulnerabili •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability. • http://secunia.com/advisories/18870 http://www.dovecot.org/list/dovecot/2006-February/011367.html http://www.securityfocus.com/bid/16672 http://www.vupen.com/english/advisories/2006/0549 https://exchange.xforce.ibmcloud.com/vulnerabilities/24709 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •