Page 2 of 15 results (0.001 seconds)

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 4

21 Dec 1999 — Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts. • https://www.exploit-db.com/exploits/19683 •

CVSS: 9.8EPSS: 42%CPEs: 2EXPL: 2

02 Mar 1999 — Buffer overflow in Ipswitch IMail Service 5.0 allows an attacker to cause a denial of service (crash) and possibly execute arbitrary commands via a long URL. • https://www.exploit-db.com/exploits/19380 •

CVSS: 10.0EPSS: 4%CPEs: 1EXPL: 2

01 Mar 1999 — Buffer overflow in IMonitor in IMail 5.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to port 8181. • https://www.exploit-db.com/exploits/19379 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

02 Feb 1999 — IPswitch WS_FTP allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920. • https://www.exploit-db.com/exploits/19167 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 2

02 Jan 1999 — IPswitch IMail allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920. • https://www.exploit-db.com/exploits/19167 •