CVE-2006-1338
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
21/03/2006
Last modified:
03/04/2025
Description
Webmail in MailEnable Professional Edition before 1.73 and Enterprise Edition before 1.21 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors involving "incorrectly encoded quoted-printable emails".
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/19288
- http://www.mailenable.com/enterprisehistory.asp
- http://www.mailenable.com/professionalhistory.asp
- http://www.osvdb.org/24014
- http://www.securityfocus.com/bid/17161
- http://www.vupen.com/english/advisories/2006/1006
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25315
- http://secunia.com/advisories/19288
- http://www.mailenable.com/enterprisehistory.asp
- http://www.mailenable.com/professionalhistory.asp
- http://www.osvdb.org/24014
- http://www.securityfocus.com/bid/17161
- http://www.vupen.com/english/advisories/2006/1006
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25315



