VYPR
Unrated severityNVD Advisory· Published Dec 19, 2006· Updated Apr 23, 2026

CVE-2006-6605

CVE-2006-6605

Description

Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.

Affected products

5
  • cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*range: <=2.35
    • cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*
  • cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*range: <=2.35
    • cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*
  • cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*
    Range: <=1.98

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.