Apache James Server 2.3.2, when configured with file-based user repositories, allows attackers to execute arbitrary system commands via unspecified vectors.
packetstormsecurity.com/files/133798/Apache-James-Server-2.3.2-Arbitrary-Command-Execution.html
packetstormsecurity.com/files/156463/Apache-James-Server-2.3.2-Insecure-User-Creation-Arbitrary-File-Write.html
www.openwall.com/lists/oss-security/2015/09/30/7
www.openwall.com/lists/oss-security/2015/10/01/2
www.securityfocus.com/archive/1/536575/100/0/threaded
blogs.apache.org/james/entry/apache_james_server_2_3