Apache James Server 2.3.2, when configured with file-based user repositories, allows attackers to execute arbitrary system commands via unspecified vectors.
https://blogs.apache.org/james/entry/apache_james_server_2_3
http://www.securityfocus.com/archive/1/536575/100/0/threaded
http://www.openwall.com/lists/oss-security/2015/10/01/2