Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ipswitch vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-0945
Format string vulnerability in the logging function in the IM Server (aka IMserve or IMserver) in Ipswitch Instant Messaging (IM) 2.0.8.1 and previous versions allows remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact...
Ipswitch Imserver
Ipswitch Instant Messaging
NA
CVE-2008-0946
Directory traversal vulnerability in the IM Server (aka IMserve or IMserver) in Ipswitch Instant Messaging (IM) 2.0.8.1 and previous versions allows remote authenticated users to create arbitrary empty files via a .. (dot dot) in the recipient field.
Ipswitch Imserver
Ipswitch Instant Messaging
NA
CVE-2007-2795
Multiple buffer overflows in Ipswitch IMail prior to 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which...
Ipswitch Imail
Ipswitch Imail 2006.1
1 EDB exploit
NA
CVE-2004-0297
Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) in Ipswitch IMail Server 8.03 allows remote malicious users to cause a denial of service (crash) and execute arbitrary code via an LDAP message with a large tag length.
Ipswitch Imail 8.0.3
Ipswitch Imail 8.0.5
2 EDB exploits
NA
CVE-2005-1252
Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote malicious users to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a G...
Ipswitch Imail 8.13
Ipswitch Imail Server
NA
CVE-1999-1551
Buffer overflow in Ipswitch IMail Service 5.0 allows an malicious user to cause a denial of service (crash) and possibly execute arbitrary commands via a long URL.
Ipswitch Imail 5.0
Ipswitch Imail 6.0
1 EDB exploit
6.5
CVSSv3
CVE-2015-7675
The "Send as attachment" feature in Ipswitch MOVEit DMZ prior to 8.2 and MOVEit Mobile prior to 1.2.2 allow remote authenticated users to bypass authorization and read uploaded files via a valid FileID in the (1) serverFileIds parameter to mobile/sendMsg or (2) arg01 pa...
Ipswitch Moveit Dmz
Ipswitch Moveit Mobile
5.3
CVSSv3
CVE-2022-29846
In Progress Ipswitch WhatsUp Gold 16.1 up to and including 21.1.1, and 22.0.0, it is possible for an unauthenticated malicious user to obtain the WhatsUp Gold installation serial number.
Ipswitch Whatsup Gold 22.0.0
Ipswitch Whatsup Gold
7.5
CVSSv3
CVE-2022-29847
In Progress Ipswitch WhatsUp Gold 21.0.0 up to and including 21.1.1, and 22.0.0, it is possible for an unauthenticated malicious user to invoke an API transaction that would allow them to relay encrypted WhatsUp Gold user credentials to an arbitrary host.
Ipswitch Whatsup Gold 22.0.0
Ipswitch Whatsup Gold
6.5
CVSSv3
CVE-2022-29848
In Progress Ipswitch WhatsUp Gold 17.0.0 up to and including 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read sensitive operating-system attributes from a host that is accessible by the WhatsUp Gold system.
Ipswitch Whatsup Gold
Ipswitch Whatsup Gold 22.0.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »