Page 2 of 17 results (0.007 seconds)

CVSS: 7.5EPSS: 9%CPEs: 12EXPL: 2

Buffer overflow in the Web Messaging daemon for Ipswitch IMail before 7.12 allows remote attackers to execute arbitrary code via a long HTTP GET request for HTTP/1.0. • https://www.exploit-db.com/exploits/21654 http://archives.neohapsis.com/archives/bugtraq/2002-07/0326.html http://archives.neohapsis.com/archives/bugtraq/2002-07/0363.html http://archives.neohapsis.com/archives/bugtraq/2002-07/0368.html http://support.ipswitch.com/kb/IM-20020729-DM01.htm http://support.ipswitch.com/kb/IM-20020731-DM02.htm http://www.iss.net/security_center/static/9679.php http://www.securityfocus.com/bid/5323 •

CVSS: 5.0EPSS: 1%CPEs: 12EXPL: 2

IPSwitch IMail Web Calendaring service (iwebcal) allows remote attackers to cause a denial of service (crash) via an HTTP POST request without a Content-Length field. • https://www.exploit-db.com/exploits/21673 http://archives.neohapsis.com/archives/bugtraq/2002-07/0399.html http://www.iss.net/security_center/static/9722.php http://www.securityfocus.com/bid/5365 •

CVSS: 10.0EPSS: 6%CPEs: 24EXPL: 0

Buffer overflow in the LDAP component of Ipswitch IMail 7.1 and earlier allows remote attackers to execute arbitrary code via a long "bind DN" parameter. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0172.html http://www.iss.net/security_center/static/9116.php http://www.securityfocus.com/bid/4780 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

Ipswitch IMail 7.0.4 and earlier allows attackers with administrator privileges to read and modify user alias and mailing list information for other domains hosted by the same server via the (1) aliasadmin or (2) listadm1 CGI programs, which do not properly verify that an administrator is the administrator for the target domain. Ipswitch IMail 7.0.4 y versiones anteriores permiten a atacantes con privilegios de administrador, leer y modificar los alias de los usuarios y la información de las listas de correo de otros dominios albergados en el mismo servidor mediante:(1) aliasadmin o(2) programas CGI listadm1, los cuales no verifica adecuadamente que un administrador realmente lo es en ese dominio. • http://support.ipswitch.com/kb/IM-20011219-DM01.htm http://support.ipswitch.com/kb/IM-20020301-DM02.htm http://www.iss.net/security_center/static/7752.php http://www.securityfocus.com/archive/1/247786 http://www.securityfocus.com/bid/3766 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Ipswitch IMail 7.04 and earlier stores a user's session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html http://online.securityfocus.com/archive/1/261096 http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3432 •