CVE-2017-12638
https://notcve.org/view.php?id=CVE-2017-12638
Stack based buffer overflow in Ipswitch IMail server up to and including 12.5.5 allows remote attackers to execute arbitrary code via unspecified vectors in IMmailSrv, aka ETBL or ETCETERABLUE. Existe un desbordamiento de búfer basado en pila en el servidor de Ipswitch IMail hasta la versión 12.5.5 (y esta incluida) que permite que atacantes remotos ejecuten código arbitrario mediante vectores no especificados en IMmailSrv, también conocido como ETBL o ETCETERABLUE. • https://docs.ipswitch.com/_Messaging/IMailServer/v12.5.6/ReleaseNotes/index.htm#link8 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-12639
https://notcve.org/view.php?id=CVE-2017-12639
Stack based buffer overflow in Ipswitch IMail server up to and including 12.5.5 allows remote attackers to execute arbitrary code via unspecified vectors in IMmailSrv, aka ETRE or ETCTERARED. Existe un desbordamiento de búfer basado en pila en el servidor de Ipswitch IMail hasta la versión 12.5.5 (y esta incluida) que permite que los atacantes remotos ejecuten código arbitrario mediante vectores no especificados en IMmailSrv, también conocido como ETRE o ETCTERARED. • https://docs.ipswitch.com/_Messaging/IMailServer/v12.5.6/ReleaseNotes/index.htm#link8 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-3925 – Ipswitch IMail Server - IMAP SEARCH Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-3925
Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command. Múltiples desbordamientos de búfer en el servicio IMAP (imapd32.exe) de Ipswitch IMail Server 2006 versiones anteriores a 2006.21 permiten a atacantes remotos autenticados ejecutar código de su elección mediante el comando (1) Search ó (2) Search Charset. • https://www.exploit-db.com/exploits/16487 https://www.exploit-db.com/exploits/4223 http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563 http://secunia.com/advisories/26123 http://www.securityfocus.com/bid/24962 http://www.securitytracker.com/id?1018419 http://www.vupen.com/english/advisories/2007/2574 https://exchange.xforce.ibmcloud.com/vulnerabilities/35496 https://exchange.xforce.ibmcl • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-3927 – IPSwitch IMail Server 2006 9.10 - Subscribe Remote Overflow
https://notcve.org/view.php?id=CVE-2007-3927
Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to "subscribe." Múltiples desbordamientos de búfer en Ipswitch IMail Server 2006 versiones anteriores a 2006.21 (1) permiten a atacantes remotos ejecutar código de su elección mediante vectores no especificados en Imailsec y (2) permiten a atacantes remotos tener un impacto desconocido mediante un vector no especificado relativo a "suscribir". • https://www.exploit-db.com/exploits/4228 http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease http://osvdb.org/45818 http://osvdb.org/45819 http://secunia.com/advisories/26123 http://www.securityfocus.com/bid/24962 http://www.securitytracker.com/id?1018421 http://www.vupen.com/english/advisories/2007/2574 https://exchange.xforce.ibmcloud.com/vulnerabilities/35504 https://exchange.xforce.ibmcloud.com/vulnerabilities/35505 •
CVE-2005-2923
https://notcve.org/view.php?id=CVE-2005-2923
The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory. • http://secunia.com/advisories/17863 http://securitytracker.com/id?1015318 http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities http://www.securityfocus.com/bid/15753 http://www.vupen.com/english/advisories/2005/2782 • CWE-20: Improper Input Validation •