Summary
Detail | |||
---|---|---|---|
Vendor | Mailenable | First view | 2005-07-12 |
Product | Mailenable Standard | Last view | 2007-02-12 |
Version | 1.701 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:mailenable:mailenable_standard |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
10 | 2007-02-12 | CVE-2006-6997 | Unspecified vulnerability in a cryptographic feature in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 leads to "weakened authentication security" with unknown impact and attack vectors. NOTE: due to lack of details, it is not clear whether this is the same as CVE-2006-1792. |
10 | 2006-04-15 | CVE-2006-1792 | Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to "authentication exploits". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337. |
5 | 2005-07-12 | CVE-2005-2223 | Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-287 | Improper Authentication |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
30583 | MailEnable POP3 Service APOP Command Remote Overflow |
24013 | MailEnable Authentication Unspecified Cryptographic Weakness |
16851 | MailEnable SMTP AUTH LOGIN Overflow |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | AUTH user overflow attempt RuleID : 3824 - Type : SERVER-MAIL - Revision : 16 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2006-03-23 | Name: The remote POP3 server is affected by a buffer overflow flaw. File: mailenable_pop_apop_overflow.nasl - Type: ACT_ATTACK |