CVE-2006-1337

N/A Unknown
Published: March 21, 2006 Modified: April 16, 2026
View on NVD

Description

Buffer overflow in the POP 3 (POP3) service in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 allows remote attackers to execute arbitrary code via unknown vectors before authentication.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/19288
Source: cve@mitre.org
Patch Vendor Advisory
http://www.osvdb.org/24012
Source: cve@mitre.org
http://www.vupen.com/english/advisories/2006/1006
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/19288
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://securitytracker.com/id?1015797
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mailenable.com/enterprisehistory.asp
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mailenable.com/professionalhistory.asp
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mailenable.com/standardhistory.asp
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/24012
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/17162
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/1006
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/25314
Source: af854a3a-2127-422b-91ae-364da2661108

20 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.9%
86th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mailenable