Vulnerabilities (CVE)

Filtered by vendor Seattle Lab Software Subscribe
Total 12 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2008-1691 1 Seattle Lab Software 1 Slmail Pro 2024-11-21 5.0 MEDIUM N/A
Unspecified vulnerability in SLMail.exe in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (UDP service outage) via a large packet to UDP port 54. NOTE: some of these details are obtained from third party information.
CVE-2008-1690 1 Seattle Lab Software 1 Slmail Pro 2024-11-21 10.0 HIGH N/A
WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a long URI in HTTP requests to TCP port 801. NOTE: some of these details are obtained from third party information.
CVE-2008-1689 1 Seattle Lab Software 1 Slmail Pro 2024-11-21 5.0 MEDIUM N/A
Stack consumption vulnerability in WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (daemon crash) via a long request header in an HTTP request to TCP port 801. NOTE: some of these details are obtained from third party information.
CVE-2008-0152 1 Seattle Lab Software 1 Slnet Rf Telnet Server 2024-11-21 4.3 MEDIUM N/A
SLnet.exe in SeattleLab SLNet RF Telnet Server 4.1.1.3758 and earlier allows user-assisted remote attackers to cause a denial of service (crash) via unspecified telnet options, which triggers a NULL pointer dereference. NOTE: the crash is not user-assisted when the server is running in debug mode.
CVE-2004-0357 1 Seattle Lab Software 1 Slmail Pro 2024-11-20 10.0 HIGH N/A
Stack-based buffer overflows in SL Mail Pro 2.0.9 allow remote attackers to execute arbitrary code via (1) user.dll, (2) loadpageadmin.dll or (3) loadpageuser.dll.
CVE-2004-0356 1 Seattle Lab Software 1 Slmail Pro 2024-11-20 10.0 HIGH N/A
Stack-based buffer overflow in Supervisor Report Center in SL Mail Pro 2.0.9 and earlier allows remote attackers to execute arbitrary code via an HTTP request with a long HTTP sub-version.
CVE-2003-0264 1 Seattle Lab Software 1 Slmail 2024-11-20 7.5 HIGH N/A
Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.
CVE-2000-0397 1 Seattle Lab Software 1 Emurl 2024-11-20 5.0 MEDIUM N/A
The EMURL web-based email account software encodes predictable identifiers in user session URLs, which allows a remote attacker to access a user's email account.
CVE-1999-1017 1 Seattle Lab Software 1 Emurl 2024-11-20 7.5 HIGH N/A
Seattle Labs Emurl 2.0, and possibly earlier versions, stores e-mail attachments in a specific directory with scripting enabled, which allows a malicious ASP file attachment to execute when the recipient opens the message.
CVE-1999-0380 1 Seattle Lab Software 1 Slmail 2024-11-20 4.6 MEDIUM N/A
SLMail 3.1 and 3.2 allows local users to access any file in the NTFS file system when the Remote Administration Service (RAS) is enabled by setting a user's Finger File to point to the target file, then running finger on the user.
CVE-1999-0231 1 Seattle Lab Software 1 Slmail 2024-11-20 5.0 MEDIUM N/A
Buffer overflow in IP-Switch IMail and Seattle Labs Slmail 2.6 packages using a long VRFY command, causing a denial of service and possibly remote access.
CVE-1999-0102 1 Seattle Lab Software 1 Slmail 2024-11-20 7.5 HIGH N/A
Buffer overflow in SLmail 3.x allows attackers to execute commands using a large FROM line.