
CVE-2001-0494
https://notcve.org/view.php?id=CVE-2001-0494
27 Jun 2001 — Buffer overflow in IPSwitch IMail SMTP server 6.06 and possibly prior versions allows remote attackers to execute arbitrary code via a long From: header. • http://archives.neohapsis.com/archives/bugtraq/2001-04/0433.html •

CVE-2001-0039
https://notcve.org/view.php?id=CVE-2001-0039
16 Feb 2001 — IPSwitch IMail 6.0.5 allows remote attackers to cause a denial of service using the SMTP AUTH command by sending a base64-encoded user password whose length is between 80 and 136 bytes. • http://archives.neohapsis.com/archives/bugtraq/2000-12/0071.html •

CVE-2000-0825
https://notcve.org/view.php?id=CVE-2000-0825
14 Nov 2000 — Ipswitch Imail 6.0 allows remote attackers to cause a denial of service via a large number of connections in which a long Host: header is sent, which causes a thread to crash. • http://archives.neohapsis.com/archives/win2ksecadvice/2000-q3/0071.html •

CVE-2000-0839
https://notcve.org/view.php?id=CVE-2000-0839
14 Nov 2000 — WinCOM LPD 1.00.90 allows remote attackers to cause a denial of service via a large number of LPD options to the LPD port (515). • http://archives.neohapsis.com/archives/bugtraq/2000-09/0212.html •

CVE-2000-0780 – Ipswitch IMail 6.x - File Attachment
https://notcve.org/view.php?id=CVE-2000-0780
13 Oct 2000 — The web server in IPSWITCH IMail 6.04 and earlier allows remote attackers to read and delete arbitrary files via a .. (dot dot) attack. • https://www.exploit-db.com/exploits/20182 •

CVE-2000-0301
https://notcve.org/view.php?id=CVE-2000-0301
06 Apr 2000 — Ipswitch IMAIL server 6.02 and earlier allows remote attackers to cause a denial of service via the AUTH CRAM-MD5 command. • http://marc.info/?l=bugtraq&m=95505800117143&w=2 •

CVE-2000-0056 – Ipswitch IMail 5.0.8/6.0/6.1 - IMonitor 'status.cgi' Denial of Service
https://notcve.org/view.php?id=CVE-2000-0056
05 Jan 2000 — IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi. • https://www.exploit-db.com/exploits/19711 •

CVE-1999-1497 – Ipswitch IMail Server 5.0/5.0.5/5.0.6/5.0.7/5.0.8/6.0 - Weak Password Encryption
https://notcve.org/view.php?id=CVE-1999-1497
21 Dec 1999 — Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts. • https://www.exploit-db.com/exploits/19683 •

CVE-1999-1078
https://notcve.org/view.php?id=CVE-1999-1078
29 Jul 1999 — WS_FTP Pro 6.0 uses weak encryption for passwords in its initialization files, which allows remote attackers to easily decrypt the passwords and gain privileges. • http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9907&L=ntbugtraq&D=0&P=10370&F=P •

CVE-2000-0019
https://notcve.org/view.php?id=CVE-2000-0019
04 Mar 1999 — IMail POP3 daemon uses weak encryption, which allows local users to read files. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0019 •