Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ipswitch vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2001-1283
The webmail interface for Ipswitch IMail 7.04 and previous versions allows remote authenticated users to cause a denial of service (crash) via a mailbox name that contains a large number of . (dot) or other characters to programs such as (1) readmail.cgi or (2) printmail.cgi, pos...
Ipswitch Imail 7.0.4
Ipswitch Imail 6.0.2
Ipswitch Imail 6.0.6
7.5
CVSSv2
CVE-2001-1284
Ipswitch IMail 7.04 and previous versions uses predictable session IDs for authentication, which allows remote malicious users to hijack sessions of other users.
Ipswitch Imail 6.0.2
Ipswitch Imail 6.0.6
Ipswitch Imail 7.0.4
5
CVSSv2
CVE-2001-1285
Directory traversal vulnerability in readmail.cgi for Ipswitch IMail 7.04 and previous versions allows remote malicious users to access the mailboxes of other users via a .. (dot dot) in the mbx parameter.
Ipswitch Imail 6.0.6
Ipswitch Imail 6.0.2
Ipswitch Imail 7.0.4
7.5
CVSSv2
CVE-2001-1286
Ipswitch IMail 7.04 and previous versions stores a user's session ID in a URL, which could allow remote malicious users to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control.
Ipswitch Imail 6.0.6
Ipswitch Imail 7.0.4
Ipswitch Imail 6.0.2
7.5
CVSSv2
CVE-2001-1287
Buffer overflow in Web Calendar in Ipswitch IMail 7.04 and previous versions allows remote malicious users to execute arbitrary code via a long HTTP GET request.
Ipswitch Imail 7.0.4
Ipswitch Imail 6.0.2
Ipswitch Imail 6.0.6
1 EDB exploit
5
CVSSv2
CVE-2000-0056
IMail IMONITOR status.cgi CGI script allows remote malicious users to cause a denial of service with many calls to status.cgi.
Ipswitch Imail 5.0.8
Ipswitch Imail 6.0
Ipswitch Imail 6.1
1 EDB exploit
7.5
CVSSv2
CVE-2017-6195
Ipswitch MOVEit Transfer (formerly DMZ) allows pre-authentication blind SQL injection. The fixed versions are MOVEit Transfer 2017 9.0.0.201, MOVEit DMZ 8.3.0.30, and MOVEit DMZ 8.2.0.20.
Ipswitch Moveit Transfer 2017 9.0
Ipswitch Moveit Dmz 8.2
Ipswitch Moveit Dmz 8.3
Ipswitch Moveit Dmz
7.2
CVSSv2
CVE-2005-0707
Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) prior to 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command.
Ipswitch Ipswitch Collaboration Suite
5
CVSSv2
CVE-2005-1249
The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote malicious users to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
Ipswitch Ipswitch Collaboration Suite
4
CVSSv2
CVE-2022-29845
In Progress Ipswitch WhatsUp Gold 21.1.0 up to and including 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read the contents of a local file.
Ipswitch Whatsup Gold 22.0.0
Ipswitch Whatsup Gold 21.1.0
Ipswitch Whatsup Gold 21.1.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-3675
CVE-2024-3400
CVE-2024-23557
mass assignment
CVE-2023-1389
local file inclusion
CVE-2024-32596
file upload
CVE-2024-32593
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »