Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
collaboration suite vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2018-10948
Synacor Zimbra Admin UI in Zimbra Collaboration Suite prior to 8.8.0 beta 2 has Persistent XSS via mail addrs.
Synacor Zimbra Collaboration Suite 8.8.0
Synacor Zimbra Collaboration Suite
5
CVSSv2
CVE-2018-10949
mailboxd in Zimbra Collaboration Suite 8.8 prior to 8.8.8; 8.7 prior to 8.7.11.Patch3; and 8.6 allows Account Enumeration by leveraging a Discrepancy between the "HTTP 404 - account is not active" and "HTTP 401 - must authenticate" errors.
Synacor Zimbra Collaboration Suite 8.6.0
Synacor Zimbra Collaboration Suite
1 Github repository
6.8
CVSSv2
CVE-2020-7796
Zimbra Collaboration Suite (ZCS) prior to 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled.
Synacor Zimbra Collaboration Suite 8.8.15
Synacor Zimbra Collaboration Suite
3.5
CVSSv2
CVE-2017-8802
Cross-site scripting (XSS) vulnerability in Zimbra Collaboration Suite (aka ZCS) prior to 8.8.0 Beta2 might allow remote malicious users to inject arbitrary web script or HTML via vectors related to the "Show Snippet" functionality.
Synocor Zimbra Collaboration Suite 8.8.0
Synocor Zimbra Collaboration Suite
1 Github repository
4.3
CVSSv2
CVE-2020-13653
An XSS vulnerability exists in the Webmail component of Zimbra Collaboration Suite prior to 8.8.15 Patch 11. It allows an malicious user to inject executable JavaScript into the account name of a user's profile. The injected code can be reflected and executed when changing a...
Synacor Zimbra Collaboration Suite 8.8.15
Synacor Zimbra Collaboration Suite
6.5
CVSSv2
CVE-2005-3526
Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and previous versions allows remote authenticated users to execute arbitrary code via a long FETCH command.
Ipswitch Ipswitch Collaboration Suite 2006.02 Premium
Ipswitch Ipswitch Collaboration Suite 2006.02 Standard
4
CVSSv2
CVE-2005-2923
The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) prior to 2.02 allows remote malicious users to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory.
Ipswitch Ipswitch Collaboration Suite 2.0
Ipswitch Ipswitch Collaboration Suite 2.01
Ipswitch Imail Server 8.20
7.5
CVSSv2
CVE-2005-2931
Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) prior to 2.02 allows remote malicious users to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands.
Ipswitch Ipswitch Collaboration Suite 2.0
Ipswitch Ipswitch Collaboration Suite 2.01
Ipswitch Imail Server 8.20
6.5
CVSSv2
CVE-2020-12339
Insufficient control flow management in the API for the Intel(R) Collaboration Suite for WebRTC before version 4.3.1 may allow an authenticated user to potentially enable escalation of privilege via network access.
Intel Collaboration Suite
7.2
CVSSv2
CVE-2005-0707
Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) prior to 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command.
Ipswitch Ipswitch Collaboration Suite
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »