Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2005-1013

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-08 Apr, 2005 | 04:00
Updated At-07 Aug, 2024 | 21:35
Rejected At-
Credits

The SMTP service in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to cause a denial of service (server crash) via an EHLO command with a Unicode string.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:08 Apr, 2005 | 04:00
Updated At:07 Aug, 2024 | 21:35
Rejected At:
▼CVE Numbering Authority (CNA)

The SMTP service in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to cause a denial of service (server crash) via an EHLO command with a Unicode string.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/12994
vdb-entry
x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/19948
vdb-entry
x_refsource_XF
http://securitytracker.com/id?1013637
vdb-entry
x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/19973
vdb-entry
x_refsource_XF
http://www.osvdb.org/15232
vdb-entry
x_refsource_OSVDB
http://marc.info/?l=bugtraq&m=111273637518494&w=2
mailing-list
x_refsource_BUGTRAQ
http://www.mailenable.com/hotfix/
x_refsource_CONFIRM
http://www.securiteam.com/windowsntfocus/5HP031PFFG.html
x_refsource_MISC
http://secunia.com/advisories/14812
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/12994
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/19948
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://securitytracker.com/id?1013637
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/19973
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.osvdb.org/15232
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://marc.info/?l=bugtraq&m=111273637518494&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.mailenable.com/hotfix/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securiteam.com/windowsntfocus/5HP031PFFG.html
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/14812
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/12994
vdb-entry
x_refsource_BID
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/19948
vdb-entry
x_refsource_XF
x_transferred
http://securitytracker.com/id?1013637
vdb-entry
x_refsource_SECTRACK
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/19973
vdb-entry
x_refsource_XF
x_transferred
http://www.osvdb.org/15232
vdb-entry
x_refsource_OSVDB
x_transferred
http://marc.info/?l=bugtraq&m=111273637518494&w=2
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.mailenable.com/hotfix/
x_refsource_CONFIRM
x_transferred
http://www.securiteam.com/windowsntfocus/5HP031PFFG.html
x_refsource_MISC
x_transferred
http://secunia.com/advisories/14812
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/12994
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/19948
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://securitytracker.com/id?1013637
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/19973
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.osvdb.org/15232
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=111273637518494&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.mailenable.com/hotfix/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securiteam.com/windowsntfocus/5HP031PFFG.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/14812
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:02 May, 2005 | 04:00
Updated At:03 Apr, 2025 | 01:03

The SMTP service in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to cause a denial of service (server crash) via an EHLO command with a Unicode string.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

mailenable
mailenable
>>mailenable_enterprise>>1.00
cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*
mailenable
mailenable
>>mailenable_enterprise>>1.01
cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*
mailenable
mailenable
>>mailenable_enterprise>>1.02
cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*
mailenable
mailenable
>>mailenable_enterprise>>1.03
cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*
mailenable
mailenable
>>mailenable_enterprise>>1.04
cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*
mailenable
mailenable
>>mailenable_professional>>1.5
cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*
mailenable
mailenable
>>mailenable_professional>>1.51
cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*
mailenable
mailenable
>>mailenable_professional>>1.52
cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*
mailenable
mailenable
>>mailenable_professional>>1.53
cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*
mailenable
mailenable
>>mailenable_professional>>1.54
cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://marc.info/?l=bugtraq&m=111273637518494&w=2cve@mitre.org
N/A
http://secunia.com/advisories/14812cve@mitre.org
N/A
http://securitytracker.com/id?1013637cve@mitre.org
Patch
http://www.mailenable.com/hotfix/cve@mitre.org
Patch
http://www.osvdb.org/15232cve@mitre.org
N/A
http://www.securiteam.com/windowsntfocus/5HP031PFFG.htmlcve@mitre.org
Exploit
Patch
Vendor Advisory
http://www.securityfocus.com/bid/12994cve@mitre.org
Exploit
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/19948cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/19973cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=111273637518494&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/14812af854a3a-2127-422b-91ae-364da2661108
N/A
http://securitytracker.com/id?1013637af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.mailenable.com/hotfix/af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.osvdb.org/15232af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securiteam.com/windowsntfocus/5HP031PFFG.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
Vendor Advisory
http://www.securityfocus.com/bid/12994af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/19948af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/19973af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://marc.info/?l=bugtraq&m=111273637518494&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/14812
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securitytracker.com/id?1013637
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.mailenable.com/hotfix/
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://www.osvdb.org/15232
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securiteam.com/windowsntfocus/5HP031PFFG.html
Source: cve@mitre.org
Resource:
Exploit
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/12994
Source: cve@mitre.org
Resource:
Exploit
Patch
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/19948
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/19973
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=111273637518494&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/14812
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://securitytracker.com/id?1013637
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.mailenable.com/hotfix/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.osvdb.org/15232
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securiteam.com/windowsntfocus/5HP031PFFG.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/12994
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/19948
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/19973
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

14Records found

CVE-2006-6484
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-2.37% / 84.33%
||
7 Day CHG~0.00%
Published-12 Dec, 2006 | 20:00
Updated-07 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information.

Action-Not Available
Vendor-mailenablen/a
Product-mailenable_enterprisemailenable_professionaln/a
CVE-2006-3277
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-17.59% / 94.83%
||
7 Day CHG~0.00%
Published-28 Jun, 2006 | 22:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument.

Action-Not Available
Vendor-mailenablen/a
Product-mailenable_enterprisemailenable_professionaln/a
CVE-2006-1338
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-3.70% / 87.47%
||
7 Day CHG~0.00%
Published-21 Mar, 2006 | 02:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving "incorrectly encoded quoted-printable emails".

Action-Not Available
Vendor-mailenablen/a
Product-mailenable_enterprisemailenable_professionaln/a
CVE-2006-0504
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.77% / 81.91%
||
7 Day CHG~0.00%
Published-01 Feb, 2006 | 22:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in MailEnable Enterprise Edition before 1.2 allows remote attackers to cause a denial of service (CPU utilization) by viewing "formatted quoted-printable emails" via webmail.

Action-Not Available
Vendor-mailenablen/a
Product-mailenable_enterprisen/a
CVE-2006-0503
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-4.17% / 88.23%
||
7 Day CHG~0.00%
Published-01 Feb, 2006 | 22:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IMAP service in MailEnable Professional Edition before 1.72 allows remote attackers to cause a denial of service (service crash) via unspecified vectors involving the EXAMINE command.

Action-Not Available
Vendor-mailenablen/a
Product-mailenable_professionaln/a
CVE-2005-2223
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-10.57% / 92.97%
||
7 Day CHG~0.00%
Published-12 Jul, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication.

Action-Not Available
Vendor-mailenablen/a
Product-mailenable_standardmailenable_professionaln/a
CVE-2004-2726
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-2.38% / 84.37%
||
7 Day CHG~0.00%
Published-09 Oct, 2007 | 10:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HTTPMail service in MailEnable Professional 1.18 does not properly handle arguments to the Authorization header, which allows remote attackers to cause a denial of service (null dereference and application crash). NOTE: This is a different vulnerability than CVE-2005-1348.

Action-Not Available
Vendor-mailenablen/a
Product-mailenablen/a
CVE-2005-0804
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-4.47% / 88.65%
||
7 Day CHG~0.00%
Published-20 Mar, 2005 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in MailEnable 1.8 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the mailto field.

Action-Not Available
Vendor-mailenablen/a
Product-mailenable_standardn/a
CVE-2004-2194
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.97% / 82.77%
||
7 Day CHG~0.00%
Published-10 Jul, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MailEnable Professional Edition before 1.53 and Enterprise Edition before 1.02 allows remote attackers to cause a denial of service (crash) via malformed (1) SMTP or (2) IMAP commands.

Action-Not Available
Vendor-mailenablen/a
Product-mailenable_enterprisemailenable_professionaln/a
CVE-2010-2580
Matching Score-8
Assigner-Flexera Software LLC
ShareView Details
Matching Score-8
Assigner-Flexera Software LLC
CVSS Score-5||MEDIUM
EPSS-2.17% / 83.66%
||
7 Day CHG~0.00%
Published-15 Sep, 2010 | 17:26
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SMTP service (MESMTPC.exe) in MailEnable 3.x and 4.25 does not properly perform a length check, which allows remote attackers to cause a denial of service (crash) via a long (1) email address in the MAIL FROM command, or (2) domain name in the RCPT TO command, which triggers an "unhandled invalid parameter error."

Action-Not Available
Vendor-mailenablen/a
Product-mailenablen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2006-4616
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-4.80% / 89.06%
||
7 Day CHG~0.00%
Published-07 Sep, 2006 | 00:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.

Action-Not Available
Vendor-mailenablen/a
Product-mailenable_standardmailenable_enterprisemailenable_professionaln/a
CVE-2002-2357
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-3.35% / 86.82%
||
7 Day CHG+2.18%
Published-29 Oct, 2007 | 19:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MailEnable 1.5 015 through 1.5 018 allows remote attackers to cause a denial of service (crash) via a long USER string, possibly due to a buffer overflow.

Action-Not Available
Vendor-mailenablen/a
Product-mailenablen/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2008-3449
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-3.42% / 86.99%
||
7 Day CHG~0.00%
Published-04 Aug, 2008 | 17:00
Updated-07 Aug, 2024 | 09:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MailEnable Professional 3.5.2 and Enterprise 3.52 allow remote attackers to cause a denial of service (crash) via multiple IMAP connection requests to the same folder.

Action-Not Available
Vendor-mailenablen/a
Product-mailenablen/a
CWE ID-CWE-399
Not Available
CVE-2005-1781
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-3.27% / 86.65%
||
7 Day CHG~0.00%
Published-31 May, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unknown vulnerability in SMTP authentication for MailEnable allows remote attackers to cause a denial of service (crash).

Action-Not Available
Vendor-mailenablen/a
Product-mailenable_enterprisemailenable_professionaln/a
Details not found