Page 17 of 125 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file. • http://securitytracker.com/id?1014047 http://www.idefense.com/application/poi/display?id=242&type=vulnerabilities http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html http://www.securityfocus.com/bid/13727 •

CVSS: 10.0EPSS: 24%CPEs: 4EXPL: 3

Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character. • https://www.exploit-db.com/exploits/1124 https://www.exploit-db.com/exploits/3627 https://www.exploit-db.com/exploits/1035 http://securitytracker.com/id?1014047 http://www.idefense.com/application/poi/display?id=243&type=vulnerabilities http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html http://www.securityfocus.com/bid/13727 •

CVSS: 5.0EPSS: 5%CPEs: 3EXPL: 0

Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument. • http://securitytracker.com/id?1014047 http://www.idefense.com/application/poi/display?id=241&type=vulnerabilities http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html http://www.securityfocus.com/bid/13727 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop. • http://securitytracker.com/id?1014047 http://www.idefense.com/application/poi/display?id=245&type=vulnerabilities http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html http://www.securityfocus.com/bid/13727 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) before 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command. • http://secunia.com/advisories/14546 http://securitytracker.com/id?1013410 http://www.idefense.com/application/poi/display?id=216&type=vulnerabilities http://www.securityfocus.com/bid/12780 https://exchange.xforce.ibmcloud.com/vulnerabilities/19655 •