Page 5 of 45 results (0.005 seconds)

CVSS: 7.5EPSS: 10%CPEs: 6EXPL: 0

Multiple buffer overflows in E-Post Mail Server 4.10 and SPA-PRO Mail @Solomon 4.00 allow remote attackers to execute arbitrary code via a long username to the (1) AUTH PLAIN or (2) AUTH LOGIN SMTP commands, which is not properly handled by (a) EPSTRS.EXE or (b) SPA-RS.EXE; (3) a long username in the APOP POP3 command, which is not properly handled by (c) EPSTPOP4S.EXE or (d) SPA-POP3S.EXE; (4) a long IMAP DELETE command, which is not properly handled by (e) EPSTIMAP4S.EXE or (f) SPA-IMAP4S.EXE. Múltiples desbordamientos de búfer en E-Post Mail Server 4.10 y SPA-PRO Mail @Solomon 4.00 permite a atacantes remotos ejecutar código de su elección mediante un nombre de usuario largo en las órdenes SMPT (1) AUTH PLAIN o (2) AUTH LOGIN, que no son manejadas adecuadamente por (a) EPSTRS.EXE o (b) SPA-RS.EXE; (3) un nombre de usuario largo en la orden POP3 APOP, que no es manejado adecuadamente por (c) EPSTOP4S, o (d) SPA-POP3S.EXE; (4) una orden IMAP DELETE larga, que no es manejada adecuadamente por (2) EPSTIMAP5S.EXE o (f) SPA-IMAP4S.EXE. • http://secunia.com/advisories/18480 http://secunia.com/secunia_research/2006-1/advisory http://www.osvdb.org/22761 http://www.osvdb.org/22762 http://www.osvdb.org/22763 http://www.securityfocus.com/bid/16379 http://www.vupen.com/english/advisories/2006/0318 https://exchange.xforce.ibmcloud.com/vulnerabilities/24331 https://exchange.xforce.ibmcloud.com/vulnerabilities/24333 https://exchange.xforce.ibmcloud.com/vulnerabilities/24334 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Multiple directory traversal vulnerabilities in (1) EPSTIMAP4S.EXE and (2) SPA-IMAP4S.EXE in the IMAP service in E-Post Mail 4.05 and SPA-PRO Mail 4.05 allow remote attackers to (a) list arbitrary directories or cause a denial of service via the LIST command; or create arbitrary files via the (b) APPEND, (c) COPY, or (d) RENAME commands. Múltiples vulnerabilidades de atravesamiento de directorios en (1) EPSTIMAP4S.EXE y (2) SPA-IMAP4S.EXE en el servicio IMAP en E-Post Mail 4.05 y SPA-PRO Mail 4.05 permiten a atacantes remotos (a) listar directorios de su elección o causar una denegación de servicio mediante la orden LIST; o crear ficheros de su elección mediante las órdenes (b) APPEND, (c) COPY, o (d) RENAME. • http://secunia.com/advisories/18480 http://secunia.com/secunia_research/2006-1/advisory http://www.osvdb.org/22764 http://www.osvdb.org/22765 http://www.securityfocus.com/bid/16379 http://www.vupen.com/english/advisories/2006/0318 https://exchange.xforce.ibmcloud.com/vulnerabilities/24336 •

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 0

Early termination vulnerability in the IMAP service in E-Post Mail 4.05 and SPA-PRO Mail 4.05 allows remote attackers to cause a denial of service (infinite loop) by sending an APPEND command and disconnecting before the expected amount of data is sent. Vulnerabilidad de termianción temprana en el servicio IMAP de E-Post MAIL 4.05 Y SPA-PRO Mail 4.05 permite a atacantes remotos causar una denegación de servicio (bucle infinito) enviando una orden APPEND y desconectando antes de que la cantidad de datos esperada sea enviada. • http://secunia.com/advisories/18480 http://secunia.com/secunia_research/2006-1/advisory http://www.osvdb.org/22766 http://www.securityfocus.com/bid/16379 http://www.vupen.com/english/advisories/2006/0318 https://exchange.xforce.ibmcloud.com/vulnerabilities/24341 •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 4

dir/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, allows remote attackers to include arbitrary local files via a null byte (%00) in the lang parameter, possibly due to a directory traversal vulnerability. • https://www.exploit-db.com/exploits/26981 http://marc.info/?l=full-disclosure&m=113570229524828&w=2 http://secunia.com/advisories/17046 http://secunia.com/advisories/17865 http://secunia.com/secunia_research/2005-62/advisory http://securitytracker.com/id?1015412 http://www.osvdb.org/22079 http://www.securityfocus.com/archive/1/420255/100/0/threaded http://www.securityfocus.com/bid/16069 https://exchange.xforce.ibmcloud.com/vulnerabilities/23897 •

CVSS: 6.5EPSS: 11%CPEs: 3EXPL: 5

IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly restrict acceptable values for the language parameter to mail/settings.html before it is stored in a database, which can allow remote authenticated users to include arbitrary PHP code via a URL in a modified lang_settings parameter to mail/index.html. • https://www.exploit-db.com/exploits/26983 https://www.exploit-db.com/exploits/26982 http://marc.info/?l=full-disclosure&m=113570229524828&w=2 http://secunia.com/advisories/17046 http://secunia.com/advisories/17865 http://secunia.com/secunia_research/2005-62/advisory http://securitytracker.com/id?1015412 http://www.osvdb.org/22080 http://www.osvdb.org/22081 http://www.securityfocus.com/archive/1/420255/100/0/threaded http://www.securityfocus.com/bid/16069 https:&# •