Page 2 of 49 results (0.005 seconds)

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

23 Mar 2007 — Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control. Múltiples desbordamientos de búfer en el control ActiveX IMAILAPILib (IMailAPI.dll) en Ipswitch IMail Server anterior a 2006.2 per... • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=487 •

CVSS: 9.8EPSS: 57%CPEs: 4EXPL: 3

08 Sep 2006 — Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character. Desbordamiento de búfer basado en montón en SMTP Daemon en Ipswitch Collaboration 2006 Suite Premium y Standard Editions, IMail, IMail Plus, e IMail Secure, permite a un atacante remoto ejecutar código de su elección a través de una c... • https://www.exploit-db.com/exploits/2601 •

CVSS: 7.5EPSS: 5%CPEs: 3EXPL: 0

07 Dec 2005 — The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory. • http://secunia.com/advisories/17863 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 3%CPEs: 3EXPL: 0

07 Dec 2005 — Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands. • http://secunia.com/advisories/17863 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

06 Jul 2005 — IMail stores usernames and passwords in cleartext in a cookie, which allows remote attackers to obtain sensitive information. • http://marc.info/?l=bugtraq&m=112060187204457&w=2 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

25 May 2005 — Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file. • http://securitytracker.com/id?1014047 •

CVSS: 6.5EPSS: 5%CPEs: 3EXPL: 0

25 May 2005 — Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument. • http://securitytracker.com/id?1014047 •

CVSS: 10.0EPSS: 7%CPEs: 4EXPL: 3

25 May 2005 — Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character. • https://www.exploit-db.com/exploits/1124 •

CVSS: 10.0EPSS: 80%CPEs: 3EXPL: 0

25 May 2005 — Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name. • http://securitytracker.com/id?1014047 •

CVSS: 8.8EPSS: 89%CPEs: 1EXPL: 4

31 Dec 2004 — Stack-based buffer overflow in IPSwitch IMail 8.13 allows remote authenticated users to execute arbitrary code via a long IMAP DELETE command. • https://www.exploit-db.com/exploits/16479 •