Page 16 of 125 results (0.004 seconds)

CVSS: 4.0EPSS: 18%CPEs: 3EXPL: 0

The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory. • http://secunia.com/advisories/17863 http://securitytracker.com/id?1015318 http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities http://www.securityfocus.com/bid/15753 http://www.vupen.com/english/advisories/2005/2782 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 57%CPEs: 3EXPL: 0

Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands. • http://secunia.com/advisories/17863 http://securitytracker.com/id?1015317 http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp http://www.securityfocus.com/bid/15752 http://www.vupen.com/english/advisories/2005/2782 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

IMail stores usernames and passwords in cleartext in a cookie, which allows remote attackers to obtain sensitive information. • http://marc.info/?l=bugtraq&m=112060187204457&w=2 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 7.5EPSS: 92%CPEs: 1EXPL: 1

SQL injection vulnerability in the logon screen of the web front end (NmConsole/Login.asp) for IpSwitch WhatsUp Professional 2005 SP1 allows remote attackers to execute arbitrary SQL commands via the (1) User Name field (sUserName parameter) or (2) Password (sPassword parameter). • https://www.exploit-db.com/exploits/25874 http://secunia.com/secunia_research/2005-13/advisory http://www.corsaire.com/advisories/c050323-001.txt http://www.idefense.com/application/poi/display?id=268&type=vulnerabilities http://www.ipswitch.com/forums/shwmessage.aspx?ForumID=20&MessageID=7699 •

CVSS: 10.0EPSS: 76%CPEs: 3EXPL: 0

Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name. • http://securitytracker.com/id?1014047 http://www.idefense.com/application/poi/display?id=244&type=vulnerabilities http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html http://www.securityfocus.com/bid/13727 •