Page 3 of 22 results (0.003 seconds)

CVSS: 6.4EPSS: 0%CPEs: 10EXPL: 0

Unspecified vulnerability in Kerio MailServer before 6.1.4 has unknown impact and remote attack vectors related to a "possible bypass of attachment filter." • http://secunia.com/advisories/19875 http://www.kerio.com/kms_history.html http://www.vupen.com/english/advisories/2006/1610 https://exchange.xforce.ibmcloud.com/vulnerabilities/26170 •

CVSS: 7.8EPSS: 6%CPEs: 24EXPL: 0

Kerio MailServer before 6.1.3 Patch 1 allows remote attackers to cause a denial of service (application crash) via a crafted IMAP LOGIN command. • http://secunia.com/advisories/19150 http://securitytracker.com/id?1015748 http://www.kerio.com/kms_history.html http://www.osvdb.org/23772 http://www.securityfocus.com/archive/1/427471/100/0/threaded http://www.securityfocus.com/bid/17043 http://www.vupen.com/english/advisories/2006/0898 https://exchange.xforce.ibmcloud.com/vulnerabilities/25150 •

CVSS: 7.5EPSS: 1%CPEs: 33EXPL: 0

The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to quickly obtain passwords that are 5 characters or less via brute force methods. • http://research.tic.udc.es/scg/advisories/20050429-1.txt http://www.kerio.com/security_advisory.html http://www.securityfocus.com/archive/1/397221 •

CVSS: 5.0EPSS: 0%CPEs: 25EXPL: 0

The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations." • http://research.tic.udc.es/scg/advisories/20050429-2.txt http://www.kerio.com/security_advisory.html http://www.securityfocus.com/archive/1/397220 •

CVSS: 5.0EPSS: 0%CPEs: 23EXPL: 0

Unknown vulnerability in WebMail in Kerio MailServer before 6.0.9 allows remote attackers to cause a denial of service (CPU consumption) via certain e-mail messages. • http://securitytracker.com/id?1013708 http://www.kerio.com/kms_history.html •