Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ipswitch imail server vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2007-1637
Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server prior to 2006.2 allow remote malicious users to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 membe...
Ipswitch Imail Plus 2006
Ipswitch Imail Premium 2006
Ipswitch Imail 2006
Ipswitch Ipswitch Collaboration Suite 2006 Standard
7.5
CVSSv2
CVE-2017-12638
Stack based buffer overflow in Ipswitch IMail server up to and including 12.5.5 allows remote malicious users to execute arbitrary code via unspecified vectors in IMmailSrv, aka ETBL or ETCETERABLUE.
Ipswitch Imail Server
7.5
CVSSv2
CVE-2017-12639
Stack based buffer overflow in Ipswitch IMail server up to and including 12.5.5 allows remote malicious users to execute arbitrary code via unspecified vectors in IMmailSrv, aka ETRE or ETCTERARED.
Ipswitch Imail Server
10
CVSSv2
CVE-2004-0297
Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) in Ipswitch IMail Server 8.03 allows remote malicious users to cause a denial of service (crash) and execute arbitrary code via an LDAP message with a large tag length.
Ipswitch Imail 8.0.3
Ipswitch Imail 8.0.5
2 EDB exploits
7.8
CVSSv2
CVE-2007-3926
Ipswitch IMail Server 2006 prior to 2006.21 allows remote malicious users to cause a denial of service (daemon crash) via unspecified vectors involving an "overwritten destructor."
Ipswitch Imail Server 2006.2
4
CVSSv2
CVE-2005-2923
The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) prior to 2.02 allows remote malicious users to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory.
Ipswitch Imail Server 8.20
Ipswitch Ipswitch Collaboration Suite 2.0
Ipswitch Ipswitch Collaboration Suite 2.01
7.5
CVSSv2
CVE-2005-2931
Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) prior to 2.02 allows remote malicious users to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands.
Ipswitch Imail Server 8.20
Ipswitch Ipswitch Collaboration Suite 2.0
Ipswitch Ipswitch Collaboration Suite 2.01
7.5
CVSSv2
CVE-2001-0494
Buffer overflow in IPSwitch IMail SMTP server 6.06 and possibly prior versions allows remote malicious users to execute arbitrary code via a long From: header.
Ipswitch Imail
5
CVSSv2
CVE-1999-1557
Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and previous versions allows remote malicious users to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
Ipswitch Imail
1 EDB exploit
4.6
CVSSv2
CVE-1999-1171
IPswitch WS_FTP allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.
Ipswitch Imail 5.0
Progress Ws Ftp Server 1.0.1.e
Progress Ws Ftp Server 1.0.2.e
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4651
CVE-2024-34255
elevation of privilege
CVE-2024-25529
CVE-2024-4671
NULL pointer dereference
CVE-2024-25527
template injection
CVE-2008-0166
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »