VYPR
Unrated severityNVD Advisory· Published Dec 12, 2006· Updated Apr 23, 2026

CVE-2006-6484

CVE-2006-6484

Description

The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information.

Affected products

49
  • cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*+ 36 more
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.31:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.32:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.33:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.34:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.35:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.36:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.37:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.38:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.39:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.40:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:2.32:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:2.33:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_enterprise:2.34:*:*:*:*:*:*:*
  • cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*+ 11 more
    • cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.82:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.83:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:2.32:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:2.33:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:2.34:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.