Show filters
79 Total Results
Displaying 51-60 of 79
Sort by:
Attacker Value
Unknown

CVE-2005-2933

Disclosure Date: October 13, 2005 (last updated February 22, 2025)
Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.
0
Attacker Value
Unknown

CVE-2005-1015

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command.
0
Attacker Value
Unknown

CVE-2005-0546

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
0
Attacker Value
Unknown

CVE-2005-0198

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
A logic error in the CRAM-MD5 code for the University of Washington IMAP (UW-IMAP) server, when Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, does not properly enforce all the required conditions for successful authentication, which allows remote attackers to authenticate as arbitrary users.
0
Attacker Value
Unknown

CVE-2004-1035

Disclosure Date: March 01, 2005 (last updated February 22, 2025)
Multiple integer signedness errors in (1) imapcommon.c, (2) main.c, (3) request.c, and (4) select.c for up-imapproxy IMAP proxy 1.2.2 allow remote attackers to cause a denial of service (server crash) and possibly leak sensitive information via certain literal values that are not properly handled when using the IMAP_Line_Read function.
0
Attacker Value
Unknown

CVE-2004-1012

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption.
0
Attacker Value
Unknown

CVE-2004-1013

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.
0
Attacker Value
Unknown

CVE-2004-1015

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.
0
Attacker Value
Unknown

CVE-2004-1011

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.
0
Attacker Value
Unknown

CVE-2004-1067

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.
0