6 results (0.002 seconds)

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

12 May 2006 — vpopmail 5.4.14 and 5.4.15, with cleartext passwords enabled, allows remote attackers to authenticate to an account that does not have a cleartext password set by using a blank password to (1) SMTP AUTH or (2) APOP. • http://secunia.com/advisories/19987 •

CVSS: 9.8EPSS: 0%CPEs: 35EXPL: 0

31 Dec 2004 — Format string vulnerability in vsybase.c in vpopmail 5.4.2 and earlier has unknown impact and attack vectors. NOTE: in a followup post, it was observed that the source code used constants that, when compiled, became static format strings. Thus this is not a vulnerability • http://archives.neohapsis.com/archives/bugtraq/2004-08/0226.html •

CVSS: 9.8EPSS: 0%CPEs: 35EXPL: 0

31 Dec 2004 — Buffer overflow in vsybase.c in vpopmail 5.4.2 and earlier might allow attackers to cause a denial of service or execute arbitrary code. • http://archives.neohapsis.com/archives/bugtraq/2004-08/0226.html •

CVSS: 5.5EPSS: 0%CPEs: 18EXPL: 0

04 Sep 2001 — Inter7 vpopmail 4.10.35 and earlier, when using the MySQL module, compiles authentication information in cleartext into the libvpopmail.a library, which allows local users to obtain the MySQL username and password by inspecting the vpopmail programs that use the library. • http://www.inter7.com/vpopmail/ChangeLog •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

30 Jun 2000 — vchkpw program in vpopmail before version 4.8 does not properly cleanse an untrusted format string used in a call to syslog, which allows remote attackers to cause a denial of service via a USER or PASS command that contains arbitrary formatting directives. • http://www.securityfocus.com/bid/1418 •

CVSS: 10.0EPSS: 2%CPEs: 10EXPL: 1

21 Jan 2000 — Buffer overflow in vchkpw/vpopmail POP authentication package allows remote attackers to gain root privileges via a long username or password. • https://www.exploit-db.com/exploits/19727 •