English
|
Deutsch
|
Español
|
Português
UserID:
Passwd:
new user
About:
Dedicated
|
Advanced
|
Standard
|
Recurring
|
No Risk
|
Desktop
|
Basic
|
Single
|
Security Seal
|
FAQ
Price/Feature Summary
|
Order
|
New Vulnerabilities
|
Confidentiality
|
Vulnerability Search
Category: SMTP problems
Search for a vulnerability:
ID #
Risk
Test Title
1.3.6.1.4.1.25623.1.0.902517
High
Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability
1.3.6.1.4.1.25623.1.0.900918
High
CMailServer ActiveX Control Multiple Buffer Overflow Vulnerabilities
1.3.6.1.4.1.25623.1.0.802914
Medium
MailEnable SMTP HELO Command Denial of Service Vulnerability
1.3.6.1.4.1.25623.1.0.802194
High
SendMail Mail Relay Vulnerability
1.3.6.1.4.1.25623.1.0.800619
High
McAfee GroupShield for Exchange X-Header Security Bypass Vulnerability
1.3.6.1.4.1.25623.1.0.56902
Medium
ArGoSoft IMAP Server Directory Traversal Vulnerability
1.3.6.1.4.1.25623.1.0.56901
Medium
Eudora Internet Mail Server Multiple DoS Vulnerabilities
1.3.6.1.4.1.25623.1.0.55349
Medium
GoodTech SMTP Server RCPT TO DoS
1.3.6.1.4.1.25623.1.0.55339
Medium
IA eMailServer Remote Format String Vulnerability
1.3.6.1.4.1.25623.1.0.55323
Medium
GoodTech SMTP Server Buffer Overflow
1.3.6.1.4.1.25623.1.0.55322
High
GoodTech SMTP Server < 5.17 Buffer Overflow
1.3.6.1.4.1.25623.1.0.53987
Low
Detect the version of Infradig Inframail Mail Server
1.3.6.1.4.1.25623.1.0.52021
High
CommuniGate Pro LIST DoS Vulnerability
1.3.6.1.4.1.25623.1.0.18528
Other
SMTP server accepts us
1.3.6.1.4.1.25623.1.0.16024
High
Sendmail WIZ
1.3.6.1.4.1.25623.1.0.15902
High
MailCarrier SMTP Buffer Overflow Vulnerability
1.3.6.1.4.1.25623.1.0.15828
High
Youngzsoft CMailServer Multiple Remote Vulnerabilities
1.3.6.1.4.1.25623.1.0.15823
Medium
Alt-N MDaemon Local Privilege Escalation Vulnerability
1.3.6.1.4.1.25623.1.0.15611
High
MailEnable Unspecified Vulnerability
1.3.6.1.4.1.25623.1.0.15464
High
MS SMTP Vulnerability (885881)
1.3.6.1.4.1.25623.1.0.14832
High
Debian GNU/Linux Sendmail Default SASL Password
1.3.6.1.4.1.25623.1.0.14819
Low
Canon ImageRUNNER Printer Email Printing
1.3.6.1.4.1.25623.1.0.14804
High
Alt-N MDaemon Multiple Buffer Overflows
1.3.6.1.4.1.25623.1.0.12232
High
Exim Multiple Overflows
1.3.6.1.4.1.25623.1.0.12102
High
Courier remote overflows
1.3.6.1.4.1.25623.1.0.12065
High
ASN.1 Parsing Vulnerabilities (SMTP check)
1.3.6.1.4.1.25623.1.0.11889
High
Exchange XEXCH50 Remote Buffer Overflow
1.3.6.1.4.1.25623.1.0.11852
High
Mail relaying (thorough test)
1.3.6.1.4.1.25623.1.0.11838
High
Sendmail prescan() overflow
1.3.6.1.4.1.25623.1.0.11828
High
Exim Heap Overflow
1.3.6.1.4.1.25623.1.0.11820
High
Postfix Multiple Vulnerabilities
1.3.6.1.4.1.25623.1.0.11772
High
Generic SMTP overflows
1.3.6.1.4.1.25623.1.0.11674
High
BaSoMail SMTP Command HELO overflow
1.3.6.1.4.1.25623.1.0.11593
High
SLMail SMTP overflows
1.3.6.1.4.1.25623.1.0.11499
High
Sendmail buffer overflow due to type conversion
1.3.6.1.4.1.25623.1.0.11421
Other
smtpscan
1.3.6.1.4.1.25623.1.0.11364
High
Sendmail Forward File Privilege Escalation Vulnerability
1.3.6.1.4.1.25623.1.0.11352
Medium
Sendmail Parsing Redirection DOS
1.3.6.1.4.1.25623.1.0.11351
Medium
Sendmail mail.local DOS
1.3.6.1.4.1.25623.1.0.11350
Medium
Sendmail ETRN command DOS
1.3.6.1.4.1.25623.1.0.11349
Medium
Sendmail Group Permissions Vulnerability
1.3.6.1.4.1.25623.1.0.11348
High
Sendmail long debug local overflow
1.3.6.1.4.1.25623.1.0.11347
High
Sendmail Local Starvation and Overflow
1.3.6.1.4.1.25623.1.0.11346
High
Sendmail 8.7.*/8.8.* local overflow
1.3.6.1.4.1.25623.1.0.11321
High
Sendmail 8.8.8 to 8.12.7 Double Pipe Access Validation Vulnerability
1.3.6.1.4.1.25623.1.0.11316
High
Sendmail remote header buffer overflow
1.3.6.1.4.1.25623.1.0.11308
Medium
MS SMTP Authorization bypass
1.3.6.1.4.1.25623.1.0.11272
High
ISMail overflow
1.3.6.1.4.1.25623.1.0.11270
High
SMTP too long line
1.3.6.1.4.1.25623.1.0.11232
High
Sendmail DNS Map TXT record overflow
1.3.6.1.4.1.25623.1.0.11100
High
eXtremail format strings
1.3.6.1.4.1.25623.1.0.11088
Medium
Sendmail debug mode leak
1.3.6.1.4.1.25623.1.0.11087
Medium
Sendmail queue manipulation & destruction
1.3.6.1.4.1.25623.1.0.11086
Medium
Sendmail custom configuration file
1.3.6.1.4.1.25623.1.0.11080
Medium
poprelayd & sendmail authentication problem
1.3.6.1.4.1.25623.1.0.11053
High
IMC SMTP EHLO Buffer Overrun
1.3.6.1.4.1.25623.1.0.10994
High
IPSwitch IMail SMTP Buffer Overflow
1.3.6.1.4.1.25623.1.0.10885
Medium
MS SMTP DoS
1.3.6.1.4.1.25623.1.0.10809
High
Sendmail -bt option
1.3.6.1.4.1.25623.1.0.10729
High
Sendmail 8.11 local overflow
1.3.6.1.4.1.25623.1.0.10703
High
SMTP Authentication Error
1.3.6.1.4.1.25623.1.0.106547
High
Haraka Command Injection Vulnerability
1.3.6.1.4.1.25623.1.0.106485
Medium
Exim Information Disclosure Vulnerability
1.3.6.1.4.1.25623.1.0.10620
High
EXPN overflow
1.3.6.1.4.1.25623.1.0.10588
High
Sendmail mime overflow
1.3.6.1.4.1.25623.1.0.105568
High
Exim Local Root / Privilege Escalation Vulnerability
1.3.6.1.4.1.25623.1.0.10543
High
Lotus Domino SMTP overflow
1.3.6.1.4.1.25623.1.0.105188
High
GNU glibc Remote Heap Buffer Overflow Vulnerability (Exim)
1.3.6.1.4.1.25623.1.0.10455
High
Buffer Overrun in ITHouse Mail Server v1.04
1.3.6.1.4.1.25623.1.0.10435
High
Imate HELO overflow
1.3.6.1.4.1.25623.1.0.10419
High
Lotus MAIL FROM overflow
1.3.6.1.4.1.25623.1.0.103935
High
Multiple Vendors STARTTLS Implementation Plaintext Arbitrary Command Injection Vulnerability
1.3.6.1.4.1.25623.1.0.103833
Medium
DeepOfix SMTP Authentication Bypass
1.3.6.1.4.1.25623.1.0.10324
High
XTramail MTA 'HELO' denial
1.3.6.1.4.1.25623.1.0.103040
High
A-V Tronics InetServ SMTP Denial of Service Vulnerability
1.3.6.1.4.1.25623.1.0.10284
High
TFS SMTP 3.2 MAIL FROM overflow
1.3.6.1.4.1.25623.1.0.10278
High
Sendmail 8.6.9 ident
1.3.6.1.4.1.25623.1.0.10261
High
Sendmail mailing to programs
1.3.6.1.4.1.25623.1.0.10260
Low
HELO overflow
1.3.6.1.4.1.25623.1.0.10259
High
Sendmail mailing to files
1.3.6.1.4.1.25623.1.0.10258
High
Sendmail's from piped program
1.3.6.1.4.1.25623.1.0.10256
High
SLMail MTA 'HELO' denial
1.3.6.1.4.1.25623.1.0.10250
Low
Sendmail redirection check
1.3.6.1.4.1.25623.1.0.10248
High
Sendmail 'decode' flaw
1.3.6.1.4.1.25623.1.0.10247
High
Sendmail DEBUG
1.3.6.1.4.1.25623.1.0.10167
Medium
NTMail3 spam feature
1.3.6.1.4.1.25623.1.0.100798
Medium
MailEnable 'MESMTRPC.exe' SMTP Service Multiple Remote Denial of Service Vulnerabilities
1.3.6.1.4.1.25623.1.0.100666
Medium
Multiple Kerio Products Administration Console File Disclosure and Corruption Vulnerability
1.3.6.1.4.1.25623.1.0.100663
Medium
Exim < 4.72 RC2 Multiple Vulnerabilities
1.3.6.1.4.1.25623.1.0.100630
Medium
Alt-N MDaemon SUBSCRIBE Remote Information Disclosure Vulnerability
1.3.6.1.4.1.25623.1.0.100624
High
Microsoft Windows SMTP Server DNS spoofing vulnerability
1.3.6.1.4.1.25623.1.0.100607
High
Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
1.3.6.1.4.1.25623.1.0.100596
Medium
Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
1.3.6.1.4.1.25623.1.0.10055
High
Sendmail 8.8.3 and 8.8.4 mime conversion overflow
1.3.6.1.4.1.25623.1.0.100528
High
SpamAssassin Milter Plugin 'mlfi_envrcpt()' Remote Arbitrary Command Injection Vulnerability
1.3.6.1.4.1.25623.1.0.100512
Medium
XMail Insecure Temporary File Creation Vulnerability
1.3.6.1.4.1.25623.1.0.10050
High
CSM Mail server MTA 'HELO' denial
1.3.6.1.4.1.25623.1.0.100490
High
Ipswitch IMail Server Multiple Local Privilege Escalation Vulnerabilities
1.3.6.1.4.1.25623.1.0.10047
High
CMail's MAIL FROM overflow
1.3.6.1.4.1.25623.1.0.100415
High
Sendmail NULL Character CA SSL Certificate Validation Security Bypass Vulnerability
1.3.6.1.4.1.25623.1.0.100298
Medium
Code-Crafters Ability Mail Server IMAP FETCH Request Remote Denial Of Service Vulnerability
1.3.6.1.4.1.25623.1.0.100185
Medium
Quick 'n Easy Mail Server SMTP Request Remote Denial Of Service Vulnerability
1.3.6.1.4.1.25623.1.0.100168
High
IceWarp Merak Mail Server 'Base64FileEncode()' Stack-Based Buffer Overflow Vulnerability
1.3.6.1.4.1.25623.1.0.100073
Medium
Mail relaying
1.3.6.1.4.1.25623.1.0.100072
Medium
Check if Mailserver answer to VRFY and EXPN requests
New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
Privacy
Registered User Login
UserID:
Passwd:
Forgot userid or passwd?
Email/Userid:
Home
|
About Us
|
Contact Us
|
Partner Programs
|
Developer APIs
|
Privacy
|
Mailing Lists
|
Abuse
Security Audits
|
Managed DNS
|
Network Monitoring
|
Site Analyzer
|
Internet Research Reports
Web Probe
|
Whois
© 1998-2018 E-Soft Inc. All rights reserved.