Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ipswitch imail vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2007-5094
Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 up to and including 8.11 allows remote malicious users to execute arbitrary code via a set of four different e-mail messages with a long boundary parameter in a certain malformed Content-Typ...
Ipswitch Imail 8.11
Ipswitch Imail 8.01
Ipswitch Imail 8.1
Ipswitch Imail 8.0.3
Ipswitch Imail 8.0.5
1 EDB exploit
445
VMScore
CVE-2005-1254
Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument.
Ipswitch Imail 8.12
Ipswitch Imail 8.13
Ipswitch Imail
1000
VMScore
CVE-2005-1255
Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote malicious users to execute arbitrary code via a LOGIN command with (1) a long username argument...
Ipswitch Imail 8.12
Ipswitch Imail 8.13
Ipswitch Ipswitch Collaboration Suite
Ipswitch Imail Server
3 EDB exploits
668
VMScore
CVE-2001-1283
The webmail interface for Ipswitch IMail 7.04 and previous versions allows remote authenticated users to cause a denial of service (crash) via a mailbox name that contains a large number of . (dot) or other characters to programs such as (1) readmail.cgi or (2) printmail.cgi, pos...
Ipswitch Imail 7.0.4
Ipswitch Imail 6.0.2
Ipswitch Imail 6.0.6
505
VMScore
CVE-2000-0056
IMail IMONITOR status.cgi CGI script allows remote malicious users to cause a denial of service with many calls to status.cgi.
Ipswitch Imail 5.0.8
Ipswitch Imail 6.0
Ipswitch Imail 6.1
1 EDB exploit
445
VMScore
CVE-2001-1280
POP3 Server for Ipswitch IMail 7.04 and previous versions generates different responses to valid and invalid user names, which allows remote malicious users to determine users on the system.
Ipswitch Imail 6.0.2
Ipswitch Imail 6.0.6
Ipswitch Imail 7.0.4
445
VMScore
CVE-2001-1281
Web Messaging Server for Ipswitch IMail 7.04 and previous versions allows remote authenticated users to change information for other users by modifying the olduser parameter in the "Change User Information" web form.
Ipswitch Imail 6.0.6
Ipswitch Imail 6.0.2
Ipswitch Imail 7.0.4
445
VMScore
CVE-2001-1282
Ipswitch IMail 7.04 and previous versions records the physical path of attachments in an e-mail message header, which could allow remote malicious users to obtain potentially sensitive configuration information.
Ipswitch Imail 6.0.2
Ipswitch Imail 6.0.6
Ipswitch Imail 7.0.4
668
VMScore
CVE-2001-1284
Ipswitch IMail 7.04 and previous versions uses predictable session IDs for authentication, which allows remote malicious users to hijack sessions of other users.
Ipswitch Imail 6.0.2
Ipswitch Imail 6.0.6
Ipswitch Imail 7.0.4
445
VMScore
CVE-2001-1285
Directory traversal vulnerability in readmail.cgi for Ipswitch IMail 7.04 and previous versions allows remote malicious users to access the mailboxes of other users via a .. (dot dot) in the mbx parameter.
Ipswitch Imail 6.0.6
Ipswitch Imail 6.0.2
Ipswitch Imail 7.0.4
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »