Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2005-3314
Stack-based buffer overflow in the IMAP daemon in Novell Netmail 3.5.2 allows remote attackers to execute arbitrary code via "long verb arguments."
Exploit prediction scoring system (EPSS) score
EPSS Score
0.834
EPSS Ranking
99.2%
CVSS Severity
CVSS v2 Score
7.5
References
http://secunia.com/advisories/17641
http://securitytracker.com/id?1015240
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972665.htm
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972672.htm
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972673.htm
http://www.osvdb.org/20956
http://www.securityfocus.com/bid/15491
http://www.vupen.com/english/advisories/2005/2494
http://www.zerodayinitiative.com/advisories/ZDI-05-003.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/23114
http://secunia.com/advisories/17641
http://securitytracker.com/id?1015240
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972665.htm
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972672.htm
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972673.htm
http://www.osvdb.org/20956
http://www.securityfocus.com/bid/15491
http://www.vupen.com/english/advisories/2005/2494
http://www.zerodayinitiative.com/advisories/ZDI-05-003.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/23114
Products affected by CVE-2005-3314
Novell
»
Netmail
»
Version:
3.5.2
cpe:2.3:a:novell:netmail:3.5.2
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved