CVE-2002-0777
https://notcve.org/view.php?id=CVE-2002-0777
Buffer overflow in the LDAP component of Ipswitch IMail 7.1 and earlier allows remote attackers to execute arbitrary code via a long "bind DN" parameter. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0172.html http://www.iss.net/security_center/static/9116.php http://www.securityfocus.com/bid/4780 •
CVE-2001-0494
https://notcve.org/view.php?id=CVE-2001-0494
Buffer overflow in IPSwitch IMail SMTP server 6.06 and possibly prior versions allows remote attackers to execute arbitrary code via a long From: header. • http://archives.neohapsis.com/archives/bugtraq/2001-04/0433.html http://ipswitch.com/Support/IMail/news.html http://www.osvdb.org/5610 https://exchange.xforce.ibmcloud.com/vulnerabilities/6445 •
CVE-2000-0780 – Ipswitch IMail 6.x - File Attachment
https://notcve.org/view.php?id=CVE-2000-0780
The web server in IPSWITCH IMail 6.04 and earlier allows remote attackers to read and delete arbitrary files via a .. (dot dot) attack. • https://www.exploit-db.com/exploits/20182 http://marc.info/?l=bugtraq&m=96767207207553&w=2 http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/1617 •
CVE-2000-0301
https://notcve.org/view.php?id=CVE-2000-0301
Ipswitch IMAIL server 6.02 and earlier allows remote attackers to cause a denial of service via the AUTH CRAM-MD5 command. • http://marc.info/?l=bugtraq&m=95505800117143&w=2 http://support.ipswitch.com/kb/IM-20000208-DM02.htm http://www.securityfocus.com/bid/1094 •
CVE-1999-1497 – Ipswitch IMail Server 5.0/5.0.5/5.0.6/5.0.7/5.0.8/6.0 - Weak Password Encryption
https://notcve.org/view.php?id=CVE-1999-1497
Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts. • https://www.exploit-db.com/exploits/19683 https://www.exploit-db.com/exploits/401 http://www.securityfocus.com/archive/1/39329 http://www.securityfocus.com/bid/880 •