5 results (0.006 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in IMAP server in Netscape Messaging Server 4.15 Patch 2 allows local users to execute arbitrary commands via a long LIST command. • http://archives.neohapsis.com/archives/bugtraq/2000-09/0334.html http://www.securityfocus.com/bid/1721 https://exchange.xforce.ibmcloud.com/vulnerabilities/5292 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

The POP3 server in Netscape Messaging Server 4.15p1 generates different error messages for incorrect user names versus incorrect passwords, which allows remote attackers to determine valid users on the system and harvest email addresses for spam abuse. • http://marc.info/?l=bugtraq&m=97138100426121&w=2 http://www.securityfocus.com/bid/1787 https://exchange.xforce.ibmcloud.com/vulnerabilities/5364 •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 2

Netscape Messaging Server 3.54, 3.55, and 3.6 allows a remote attacker to cause a denial of service (memory exhaustion) via a series of long RCPT TO commands. • https://www.exploit-db.com/exploits/19571 http://marc.info/?l=bugtraq&m=94117465014255&w=2 http://www.securityfocus.com/bid/748 •

CVSS: 10.0EPSS: 92%CPEs: 2EXPL: 1

Arbitrary command execution via IMAP buffer overflow in authenticate command. • https://www.exploit-db.com/exploits/19107 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/177 http://www.securityfocus.com/bid/130 •

CVSS: 5.0EPSS: 0%CPEs: 22EXPL: 0

Information from SSL-encrypted sessions via PKCS #1. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •