10 results (0.009 seconds)

CVSS: 6.0EPSS: 7%CPEs: 1EXPL: 2

Stack-based buffer overflow in IMAPD in Mercury/32 4.52 allows remote authenticated users to execute arbitrary code via a long argument in a SEARCH ON command. NOTE: this issue might overlap with CVE-2004-1211. Desbordamiento de búfer basado en pila en el IMAPD del Mercury/32 4.52 permite a usuarios remotos autenticados ejecutar código de su elección a través de un argumento largo en el comando SEARCH ON. NOTA: esta vulnerabilidad puede solaparse con la CVE-2004-1211. • https://www.exploit-db.com/exploits/4429 http://osvdb.org/39670 http://secunia.com/advisories/26878 http://www.securityfocus.com/bid/25733 http://www.securitytracker.com/id?1018714 http://www.vupen.com/english/advisories/2007/3224 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.1EPSS: 10%CPEs: 4EXPL: 0

Stack-based buffer overflow in the trace message functionality in Pegasus Mail 4.21a through 4.21c and 4.30PB1 allow remote attackers to execute arbitrary code via a long POP3 reply. • http://secunia.com/advisories/17992 http://secunia.com/secunia_research/2005-61/advisory http://securitytracker.com/id?1015385 http://www.osvdb.org/21842 http://www.pmail.com/newsflash.htm#secunia http://www.securityfocus.com/archive/1/419908/100/0/threaded http://www.securityfocus.com/bid/15973 http://www.vupen.com/english/advisories/2005/3004 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.1EPSS: 11%CPEs: 4EXPL: 0

Off-by-one error in Pegasus Mail 4.21a through 4.21c and 4.30PB1 allows remote attackers to execute arbitrary code via a long email message header, which triggers a one-byte buffer overflow. • http://secunia.com/advisories/17992 http://secunia.com/secunia_research/2005-61/advisory http://securitytracker.com/id?1015385 http://www.osvdb.org/21843 http://www.pmail.com/newsflash.htm#secunia http://www.securityfocus.com/archive/1/419908/100/0/threaded http://www.securityfocus.com/bid/15973 •

CVSS: 7.5EPSS: 94%CPEs: 1EXPL: 3

Buffer overflow in Mercury Mail Transport System 4.01b allows remote attackers to execute arbitrary code via a long request to TCP port 105. • https://www.exploit-db.com/exploits/1375 https://www.exploit-db.com/exploits/16419 http://secunia.com/advisories/18611 http://securitytracker.com/id?1015374 http://www.osvdb.org/22103 http://www.securityfocus.com/bid/16396 https://exchange.xforce.ibmcloud.com/vulnerabilities/23669 •

CVSS: 10.0EPSS: 96%CPEs: 1EXPL: 8

Multiple buffer overflows in the IMAP service in Mercury/32 4.01a allow remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via long arguments to the (1) EXAMINE, (2) SUBSCRIBE, (3) STATUS, (4) APPEND, (5) CHECK, (6) CLOSE, (7) EXPUNGE, (8) FETCH, (9) RENAME, (10) DELETE, (11) LIST, (12) SEARCH, (13) CREATE, or (14) UNSUBSCRIBE commands. • https://www.exploit-db.com/exploits/1159 https://www.exploit-db.com/exploits/16484 https://www.exploit-db.com/exploits/668 https://www.exploit-db.com/exploits/663 https://www.exploit-db.com/exploits/3561 https://www.exploit-db.com/exploits/4316 https://www.exploit-db.com/exploits/670 http://home.kabelfoon.nl/~jaabogae/han/m_401b.html http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/029701.html http://marc.info/?l=bugtraq&m=110193702909991&w& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •