![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
ID # | Risk | Test Title |
1.3.6.1.4.1.25623.1.0.902517 | High | Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability |
1.3.6.1.4.1.25623.1.0.901195 | High | Ipswitch IMail Server STARTTLS Plaintext Command Injection Vulnerability |
1.3.6.1.4.1.25623.1.0.900918 | High | CMailServer ActiveX Control Multiple Buffer Overflow Vulnerabilities |
1.3.6.1.4.1.25623.1.0.802914 | Medium | MailEnable <= 2.0 SMTP HELO DoS Vulnerability - Active Check |
1.3.6.1.4.1.25623.1.0.802194 | High | Sendmail Mail Relay Vulnerability |
1.3.6.1.4.1.25623.1.0.800619 | High | McAfee GroupShield for Exchange X-Header Security Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.56902 | Medium | ArGoSoft IMAP Server Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.56901 | Medium | Eudora Internet Mail Server Multiple DoS Vulnerabilities |
1.3.6.1.4.1.25623.1.0.55349 | Medium | GoodTech SMTP Server RCPT TO DoS |
1.3.6.1.4.1.25623.1.0.55339 | Medium | IA eMailServer Remote Format String Vulnerability |
1.3.6.1.4.1.25623.1.0.55323 | Medium | GoodTech SMTP Server Buffer Overflow |
1.3.6.1.4.1.25623.1.0.55322 | High | GoodTech SMTP Server < 5.17 Buffer Overflow |
1.3.6.1.4.1.25623.1.0.53987 | Low | Detect the version of Infradig Inframail Mail Server |
1.3.6.1.4.1.25623.1.0.52021 | High | CommuniGate Pro LIST DoS Vulnerability |
1.3.6.1.4.1.25623.1.0.16024 | High | Sendmail WIZ Command Enabled |
1.3.6.1.4.1.25623.1.0.15902 | High | TABS MailCarrier SMTP Buffer Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.15828 | High | Youngzsoft CMailServer Multiple Remote Vulnerabilities |
1.3.6.1.4.1.25623.1.0.15823 | Medium | Alt-N MDaemon Local Privilege Escalation Vulnerability |
1.3.6.1.4.1.25623.1.0.15611 | High | MailEnable Unspecified Vulnerability |
1.3.6.1.4.1.25623.1.0.15464 | High | MS SMTP Vulnerability (885881) |
1.3.6.1.4.1.25623.1.0.154240 | High | Exim 4.96 < 4.98.2 Privilege Escalation Vulnerability |
1.3.6.1.4.1.25623.1.0.154064 | High | Exim 4.98 < 4.98.1 SQLi Vulnerability |
1.3.6.1.4.1.25623.1.0.153183 | High | OpenSMTPD < 6.6.2p1 RCE Vulnerability - Active Check |
1.3.6.1.4.1.25623.1.0.152558 | High | Exim <= 4.97.1 Header Filename Parsing Vulnerability (Jun 2024) |
1.3.6.1.4.1.25623.1.0.14832 | High | Debian GNU/Linux Sendmail Default SASL Password |
1.3.6.1.4.1.25623.1.0.14819 | Low | Canon ImageRUNNER Printer Email Printing |
1.3.6.1.4.1.25623.1.0.14804 | High | Alt-N MDaemon Multiple Buffer Overflows |
1.3.6.1.4.1.25623.1.0.140539 | High | Exim Multiple RCE Vulnerabilities |
1.3.6.1.4.1.25623.1.0.12232 | High | Exim Multiple Overflows |
1.3.6.1.4.1.25623.1.0.12102 | High | Courier remote overflows |
1.3.6.1.4.1.25623.1.0.12065 | High | ASN.1 Parsing Vulnerabilities (SMTP check) |
1.3.6.1.4.1.25623.1.0.11889 | High | Exchange XEXCH50 Remote Buffer Overflow |
1.3.6.1.4.1.25623.1.0.11852 | High | Mail relaying (thorough test) |
1.3.6.1.4.1.25623.1.0.11838 | High | Sendmail prescan() overflow |
1.3.6.1.4.1.25623.1.0.11828 | High | Exim Heap Overflow |
1.3.6.1.4.1.25623.1.0.11820 | High | Postfix Multiple Vulnerabilities |
1.3.6.1.4.1.25623.1.0.11772 | High | Generic SMTP overflows |
1.3.6.1.4.1.25623.1.0.11674 | High | BaSoMail SMTP Command HELO overflow |
1.3.6.1.4.1.25623.1.0.11593 | High | SLMail SMTP overflows |
1.3.6.1.4.1.25623.1.0.11499 | High | Sendmail buffer overflow due to type conversion |
1.3.6.1.4.1.25623.1.0.114256 | Medium | Sendmail < 8.18 SMTP Smuggling Vulnerability (Dec 2023) |
1.3.6.1.4.1.25623.1.0.114255 | Medium | Postfix SMTP Smuggling Vulnerability (Dec 2023) |
1.3.6.1.4.1.25623.1.0.114254 | Medium | Exim < 4.97.1 SMTP Smuggling Vulnerability (Dec 2023) |
1.3.6.1.4.1.25623.1.0.11421 | Other | smtpscan |
1.3.6.1.4.1.25623.1.0.11364 | High | Sendmail Forward File Privilege Escalation Vulnerability |
1.3.6.1.4.1.25623.1.0.11352 | Medium | Sendmail 8.8.8 - 8.9.2 Parsing Redirection DoS Vulnerability |
1.3.6.1.4.1.25623.1.0.11351 | Medium | Sendmail < 8.10.0 mail.local DoS Vulnerability |
1.3.6.1.4.1.25623.1.0.11350 | Medium | Sendmail 8.x - 8.10.0 ETRN Command DoS Vulnerability |
1.3.6.1.4.1.25623.1.0.11349 | Medium | Sendmail 8.8.x - 8.8.3 Group Permissions Vulnerability |
1.3.6.1.4.1.25623.1.0.11348 | High | Sendmail 8.x < 8.6.7 Long Debug Local Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.11347 | High | Sendmail 8.6.x, 8.7.x - 8.7.5 Local Starvation and Overflow Vulnerabilities |
1.3.6.1.4.1.25623.1.0.11346 | High | Sendmail 8.7.x, 8.8.x - 8.8.2 Local Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.11321 | High | Sendmail 8.8.8 - 8.12.7 Double Pipe Access Validation Vulnerability |
1.3.6.1.4.1.25623.1.0.11316 | High | Sendmail 5.79 - 8.12.7 Remote Header Buffer Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.11308 | Medium | MS SMTP Authorization bypass |
1.3.6.1.4.1.25623.1.0.11272 | High | ISMail overflow |
1.3.6.1.4.1.25623.1.0.11270 | High | SMTP too long line |
1.3.6.1.4.1.25623.1.0.11232 | High | Sendmail DNS Map TXT record overflow |
1.3.6.1.4.1.25623.1.0.11100 | High | eXtremail format strings |
1.3.6.1.4.1.25623.1.0.11088 | Medium | Sendmail DEBUG Mode Leak Vulnerability |
1.3.6.1.4.1.25623.1.0.11087 | Medium | Sendmail Queue Manipulation & Destruction Vulnerability |
1.3.6.1.4.1.25623.1.0.11086 | Medium | Sendmail 8.12.0.x Custom Configuration File Vulnerability |
1.3.6.1.4.1.25623.1.0.11080 | Medium | poprelayd & sendmail Authentication Problem |
1.3.6.1.4.1.25623.1.0.11053 | High | IMC SMTP EHLO Buffer Overrun |
1.3.6.1.4.1.25623.1.0.10994 | High | IPSwitch IMail SMTP Buffer Overflow |
1.3.6.1.4.1.25623.1.0.10885 | Medium | MS SMTP DoS |
1.3.6.1.4.1.25623.1.0.108367 | High | Exim < 4.90.1 RCE Vulnerability - Version Check |
1.3.6.1.4.1.25623.1.0.10809 | High | Sendmail -bt option |
1.3.6.1.4.1.25623.1.0.10729 | High | Sendmail 8.11 local overflow |
1.3.6.1.4.1.25623.1.0.10703 | High | SMTP Authentication Error |
1.3.6.1.4.1.25623.1.0.106547 | High | Haraka Command Injection Vulnerability |
1.3.6.1.4.1.25623.1.0.106485 | Medium | Exim 4.69 - 4.87 Information Disclosure Vulnerability |
1.3.6.1.4.1.25623.1.0.10620 | High | EXPN overflow |
1.3.6.1.4.1.25623.1.0.10588 | High | Sendmail mime overflow |
1.3.6.1.4.1.25623.1.0.105568 | High | Exim < 4.86.2 Local Root / Privilege Escalation Vulnerability |
1.3.6.1.4.1.25623.1.0.10543 | High | Lotus Domino SMTP overflow |
1.3.6.1.4.1.25623.1.0.105188 | High | GNU glibc Remote Heap Buffer Overflow Vulnerability (Exim) |
1.3.6.1.4.1.25623.1.0.10455 | High | Buffer Overrun in ITHouse Mail Server v1.04 |
1.3.6.1.4.1.25623.1.0.10435 | High | Imate HELO overflow |
1.3.6.1.4.1.25623.1.0.10419 | High | Lotus MAIL FROM overflow |
1.3.6.1.4.1.25623.1.0.103935 | High | Multiple Vendors STARTTLS Implementation Plaintext Arbitrary Command Injection Vulnerability |
1.3.6.1.4.1.25623.1.0.103833 | Medium | DeepOfix SMTP Authentication Bypass |
1.3.6.1.4.1.25623.1.0.10324 | High | XTramail MTA 'HELO' denial |
1.3.6.1.4.1.25623.1.0.103040 | High | A-V Tronics InetServ SMTP Denial of Service Vulnerability |
1.3.6.1.4.1.25623.1.0.10284 | High | TFS SMTP 3.2 MAIL FROM overflow |
1.3.6.1.4.1.25623.1.0.10278 | High | Sendmail 8.6.9 ident |
1.3.6.1.4.1.25623.1.0.10261 | High | Sendmail mailing to programs |
1.3.6.1.4.1.25623.1.0.10260 | Low | HELO overflow |
1.3.6.1.4.1.25623.1.0.10259 | High | Sendmail mailing to files |
1.3.6.1.4.1.25623.1.0.10258 | Other | Sendmail's from piped program |
1.3.6.1.4.1.25623.1.0.10256 | High | SLMail MTA 'HELO' denial |
1.3.6.1.4.1.25623.1.0.10250 | Low | Sendmail redirection check |
1.3.6.1.4.1.25623.1.0.10248 | High | Sendmail 'decode' flaw |
1.3.6.1.4.1.25623.1.0.10247 | High | Sendmail DEBUG Command Enabled |
1.3.6.1.4.1.25623.1.0.10167 | Medium | NTMail3 spam feature |
1.3.6.1.4.1.25623.1.0.100798 | Medium | MailEnable <= 4.25 Multiple DoS Vulnerabilities |
1.3.6.1.4.1.25623.1.0.100663 | Medium | Exim < 4.72 RC2 Multiple Vulnerabilities |
1.3.6.1.4.1.25623.1.0.100630 | Medium | Alt-N MDaemon SUBSCRIBE Remote Information Disclosure Vulnerability |
1.3.6.1.4.1.25623.1.0.100624 | High | Microsoft Windows SMTP Server DNS spoofing vulnerability |
1.3.6.1.4.1.25623.1.0.100607 | High | Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.100596 | Medium | Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability |
1.3.6.1.4.1.25623.1.0.10055 | High | Sendmail 8.8.3 and 8.8.4 mime conversion overflow |
1.3.6.1.4.1.25623.1.0.100528 | High | SpamAssassin Milter Plugin 'mlfi_envrcpt()' Remote Arbitrary Command Injection Vulnerability - Active Check |
1.3.6.1.4.1.25623.1.0.100512 | Medium | XMail Insecure Temporary File Creation Vulnerability |
1.3.6.1.4.1.25623.1.0.10050 | High | CSM Mail server MTA 'HELO' denial |
1.3.6.1.4.1.25623.1.0.10047 | High | CMail's MAIL FROM overflow |
1.3.6.1.4.1.25623.1.0.100415 | High | Sendmail NULL Character CA SSL Certificate Validation Security Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.100185 | Medium | Quick 'n Easy Mail Server 3.3 SMTP Request Remote DoS Vulnerability |
1.3.6.1.4.1.25623.1.0.100073 | High | Mail relaying |
1.3.6.1.4.1.25623.1.0.100072 | Medium | Check if Mailserver answer to VRFY and EXPN requests |