Page 2 of 13 results (0.007 seconds)
CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1
CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 4
CVSS: 9.8EPSS: 88%CPEs: 2EXPL: 2

CVE-2000-0056 – Ipswitch IMail 5.0.8/6.0/6.1 - IMonitor 'status.cgi' Denial of Service
https://notcve.org/view.php?id=CVE-2000-0056
05 Jan 2000 — IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi. • https://www.exploit-db.com/exploits/19711 •

CVE-1999-1497 – Ipswitch IMail Server 5.0/5.0.5/5.0.6/5.0.7/5.0.8/6.0 - Weak Password Encryption
https://notcve.org/view.php?id=CVE-1999-1497
21 Dec 1999 — Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts. • https://www.exploit-db.com/exploits/19683 •

CVE-1999-1551 – Ipswitch IMail 5.0/6.0 - Web Service Buffer Overflow (Denial of Service) (PoC)
https://notcve.org/view.php?id=CVE-1999-1551
02 Mar 1999 — Buffer overflow in Ipswitch IMail Service 5.0 allows an attacker to cause a denial of service (crash) and possibly execute arbitrary commands via a long URL. • https://www.exploit-db.com/exploits/19380 •