Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ipswitch vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2001-1280
POP3 Server for Ipswitch IMail 7.04 and previous versions generates different responses to valid and invalid user names, which allows remote malicious users to determine users on the system.
Ipswitch Imail 6.0.2
Ipswitch Imail 6.0.6
Ipswitch Imail 7.0.4
445
VMScore
CVE-2001-1281
Web Messaging Server for Ipswitch IMail 7.04 and previous versions allows remote authenticated users to change information for other users by modifying the olduser parameter in the "Change User Information" web form.
Ipswitch Imail 6.0.6
Ipswitch Imail 6.0.2
Ipswitch Imail 7.0.4
445
VMScore
CVE-2001-1282
Ipswitch IMail 7.04 and previous versions records the physical path of attachments in an e-mail message header, which could allow remote malicious users to obtain potentially sensitive configuration information.
Ipswitch Imail 6.0.2
Ipswitch Imail 6.0.6
Ipswitch Imail 7.0.4
668
VMScore
CVE-2001-1284
Ipswitch IMail 7.04 and previous versions uses predictable session IDs for authentication, which allows remote malicious users to hijack sessions of other users.
Ipswitch Imail 6.0.2
Ipswitch Imail 6.0.6
Ipswitch Imail 7.0.4
445
VMScore
CVE-2001-1285
Directory traversal vulnerability in readmail.cgi for Ipswitch IMail 7.04 and previous versions allows remote malicious users to access the mailboxes of other users via a .. (dot dot) in the mbx parameter.
Ipswitch Imail 6.0.6
Ipswitch Imail 6.0.2
Ipswitch Imail 7.0.4
668
VMScore
CVE-2001-1286
Ipswitch IMail 7.04 and previous versions stores a user's session ID in a URL, which could allow remote malicious users to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control.
Ipswitch Imail 6.0.6
Ipswitch Imail 7.0.4
Ipswitch Imail 6.0.2
668
VMScore
CVE-2017-6195
Ipswitch MOVEit Transfer (formerly DMZ) allows pre-authentication blind SQL injection. The fixed versions are MOVEit Transfer 2017 9.0.0.201, MOVEit DMZ 8.3.0.30, and MOVEit DMZ 8.2.0.20.
Ipswitch Moveit Transfer 2017 9.0
Ipswitch Moveit Dmz 8.2
Ipswitch Moveit Dmz 8.3
Ipswitch Moveit Dmz
641
VMScore
CVE-2005-0707
Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) prior to 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command.
Ipswitch Ipswitch Collaboration Suite
445
VMScore
CVE-2005-1249
The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote malicious users to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
Ipswitch Ipswitch Collaboration Suite
356
VMScore
CVE-2022-29845
In Progress Ipswitch WhatsUp Gold 21.1.0 up to and including 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read the contents of a local file.
Ipswitch Whatsup Gold 22.0.0
Ipswitch Whatsup Gold 21.1.0
Ipswitch Whatsup Gold 21.1.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »