CVE-2006-2346
https://notcve.org/view.php?id=CVE-2006-2346
vpopmail 5.4.14 and 5.4.15, with cleartext passwords enabled, allows remote attackers to authenticate to an account that does not have a cleartext password set by using a blank password to (1) SMTP AUTH or (2) APOP. • http://secunia.com/advisories/19987 http://sourceforge.net/project/shownotes.php?release_id=415350 http://www.osvdb.org/25445 http://www.securityfocus.com/bid/17894 http://www.vupen.com/english/advisories/2006/1698 https://exchange.xforce.ibmcloud.com/vulnerabilities/26333 •
CVE-2004-2238
https://notcve.org/view.php?id=CVE-2004-2238
Format string vulnerability in vsybase.c in vpopmail 5.4.2 and earlier has unknown impact and attack vectors. NOTE: in a followup post, it was observed that the source code used constants that, when compiled, became static format strings. Thus this is not a vulnerability • http://archives.neohapsis.com/archives/bugtraq/2004-08/0226.html http://archives.neohapsis.com/archives/bugtraq/2004-08/0264.html http://archives.neohapsis.com/archives/bugtraq/2004-08/0286.html http://www.osvdb.org/9147 http://www.securityfocus.com/bid/10962 https://exchange.xforce.ibmcloud.com/vulnerabilities/17017 •
CVE-2004-2239
https://notcve.org/view.php?id=CVE-2004-2239
Buffer overflow in vsybase.c in vpopmail 5.4.2 and earlier might allow attackers to cause a denial of service or execute arbitrary code. • http://archives.neohapsis.com/archives/bugtraq/2004-08/0226.html http://archives.neohapsis.com/archives/bugtraq/2004-08/0264.html http://archives.neohapsis.com/archives/bugtraq/2004-08/0286.html http://www.osvdb.org/9146 http://www.securityfocus.com/bid/10962 https://exchange.xforce.ibmcloud.com/vulnerabilities/17016 •
CVE-2001-0990
https://notcve.org/view.php?id=CVE-2001-0990
Inter7 vpopmail 4.10.35 and earlier, when using the MySQL module, compiles authentication information in cleartext into the libvpopmail.a library, which allows local users to obtain the MySQL username and password by inspecting the vpopmail programs that use the library. • http://www.inter7.com/vpopmail/ChangeLog http://www.securityfocus.com/archive/1/212036 http://www.securityfocus.com/bid/3284 https://exchange.xforce.ibmcloud.com/vulnerabilities/7076 •
CVE-2000-0583
https://notcve.org/view.php?id=CVE-2000-0583
vchkpw program in vpopmail before version 4.8 does not properly cleanse an untrusted format string used in a call to syslog, which allows remote attackers to cause a denial of service via a USER or PASS command that contains arbitrary formatting directives. • http://www.securityfocus.com/bid/1418 http://www.securityfocus.com/templates/archive.pike?list=1&msg=395BD2A8.5D3396A7%40secureaustin.com http://www.vpopmail.cx/vpopmail-ChangeLog •