Buffer overflow in the POP3 server in Kinesphere Corporation eXchange before 5.0.060125 allows remote attackers to execute arbitrary code via a long RCPT TO argument.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2006-02/0040.html - | |
References | () http://downloads.securityfocus.com/vulnerabilities/exploits/exchangepop3.pl - Exploit | |
References | () http://secunia.com/advisories/18687 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/408 - | |
References | () http://securitytracker.com/id?1015580 - | |
References | () http://www.osvdb.org/22907 - | |
References | () http://www.securityfocus.com/bid/16485 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/0437 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24477 - | |
References | () https://www.exploit-db.com/exploits/1466 - |
Information
Published : 2006-02-04 00:06
Updated : 2025-04-03 01:03
NVD link : CVE-2006-0537
Mitre link : CVE-2006-0537
CVE.ORG link : CVE-2006-0537
JSON object : View
Products Affected
kinesphere_corporation
- exchange_pop3
CWE