Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ipswitch vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv2
CVE-2005-3526
Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and previous versions allows remote authenticated users to execute arbitrary code via a long FETCH command.
Ipswitch Ipswitch Collaboration Suite 2006.02 Premium
Ipswitch Ipswitch Collaboration Suite 2006.02 Standard
5
CVSSv2
CVE-2005-1939
Directory traversal vulnerability in Ipswitch WhatsUp Small Business 2004 allows remote malicious users to read arbitrary files via ".." (dot dot) sequences in a request to the Report service (TCP 8022).
Ipswitch Whatsup Small Business 2004
1 EDB exploit
4
CVSSv2
CVE-2005-2923
The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) prior to 2.02 allows remote malicious users to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory.
Ipswitch Imail Server 8.20
Ipswitch Ipswitch Collaboration Suite 2.0
Ipswitch Ipswitch Collaboration Suite 2.01
7.5
CVSSv2
CVE-2005-2931
Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) prior to 2.02 allows remote malicious users to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands.
Ipswitch Imail Server 8.20
Ipswitch Ipswitch Collaboration Suite 2.0
Ipswitch Ipswitch Collaboration Suite 2.01
5
CVSSv2
CVE-2005-2160
IMail stores usernames and passwords in cleartext in a cookie, which allows remote malicious users to obtain sensitive information.
Ipswitch Imail 2006
7.5
CVSSv2
CVE-2005-1250
SQL injection vulnerability in the logon screen of the web front end (NmConsole/Login.asp) for IpSwitch WhatsUp Professional 2005 SP1 allows remote malicious users to execute arbitrary SQL commands via the (1) User Name field (sUserName parameter) or (2) Password (sPassword param...
Ipswitch Whatsup Professional 2005 Sp1
1 EDB exploit
5
CVSSv2
CVE-2005-1249
The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote malicious users to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
Ipswitch Ipswitch Collaboration Suite
5
CVSSv2
CVE-2005-1252
Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote malicious users to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a G...
Ipswitch Imail 8.13
Ipswitch Imail Server
10
CVSSv2
CVE-2005-1255
Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote malicious users to execute arbitrary code via a LOGIN command with (1) a long username argument...
Ipswitch Imail 8.12
Ipswitch Imail 8.13
Ipswitch Ipswitch Collaboration Suite
Ipswitch Imail Server
3 EDB exploits
5
CVSSv2
CVE-2005-1254
Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument.
Ipswitch Imail 8.12
Ipswitch Imail 8.13
Ipswitch Imail
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »