Filtered by vendor Seattle Lab Software
Subscriptions
Total
12 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2008-1691 | 1 Seattle Lab Software | 1 Slmail Pro | 2024-11-21 | N/A |
Unspecified vulnerability in SLMail.exe in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (UDP service outage) via a large packet to UDP port 54. NOTE: some of these details are obtained from third party information. | ||||
CVE-2008-1690 | 1 Seattle Lab Software | 1 Slmail Pro | 2024-11-21 | N/A |
WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a long URI in HTTP requests to TCP port 801. NOTE: some of these details are obtained from third party information. | ||||
CVE-2008-1689 | 1 Seattle Lab Software | 1 Slmail Pro | 2024-11-21 | N/A |
Stack consumption vulnerability in WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (daemon crash) via a long request header in an HTTP request to TCP port 801. NOTE: some of these details are obtained from third party information. | ||||
CVE-2008-0152 | 1 Seattle Lab Software | 1 Slnet Rf Telnet Server | 2024-11-21 | N/A |
SLnet.exe in SeattleLab SLNet RF Telnet Server 4.1.1.3758 and earlier allows user-assisted remote attackers to cause a denial of service (crash) via unspecified telnet options, which triggers a NULL pointer dereference. NOTE: the crash is not user-assisted when the server is running in debug mode. | ||||
CVE-2004-0357 | 1 Seattle Lab Software | 1 Slmail Pro | 2024-11-20 | N/A |
Stack-based buffer overflows in SL Mail Pro 2.0.9 allow remote attackers to execute arbitrary code via (1) user.dll, (2) loadpageadmin.dll or (3) loadpageuser.dll. | ||||
CVE-2004-0356 | 1 Seattle Lab Software | 1 Slmail Pro | 2024-11-20 | N/A |
Stack-based buffer overflow in Supervisor Report Center in SL Mail Pro 2.0.9 and earlier allows remote attackers to execute arbitrary code via an HTTP request with a long HTTP sub-version. | ||||
CVE-2003-0264 | 1 Seattle Lab Software | 1 Slmail | 2024-11-20 | N/A |
Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server. | ||||
CVE-2000-0397 | 1 Seattle Lab Software | 1 Emurl | 2024-11-20 | N/A |
The EMURL web-based email account software encodes predictable identifiers in user session URLs, which allows a remote attacker to access a user's email account. | ||||
CVE-1999-1017 | 1 Seattle Lab Software | 1 Emurl | 2024-11-20 | N/A |
Seattle Labs Emurl 2.0, and possibly earlier versions, stores e-mail attachments in a specific directory with scripting enabled, which allows a malicious ASP file attachment to execute when the recipient opens the message. | ||||
CVE-1999-0380 | 1 Seattle Lab Software | 1 Slmail | 2024-11-20 | N/A |
SLMail 3.1 and 3.2 allows local users to access any file in the NTFS file system when the Remote Administration Service (RAS) is enabled by setting a user's Finger File to point to the target file, then running finger on the user. | ||||
CVE-1999-0231 | 1 Seattle Lab Software | 1 Slmail | 2024-11-20 | N/A |
Buffer overflow in IP-Switch IMail and Seattle Labs Slmail 2.6 packages using a long VRFY command, causing a denial of service and possibly remote access. | ||||
CVE-1999-0102 | 1 Seattle Lab Software | 1 Slmail | 2024-11-20 | N/A |
Buffer overflow in SLmail 3.x allows attackers to execute commands using a large FROM line. |
Page 1 of 1.