Page 2 of 15 results (0.006 seconds)

CVSS: 10.0EPSS: 15%CPEs: 2EXPL: 1

Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to "subscribe." Múltiples desbordamientos de búfer en Ipswitch IMail Server 2006 versiones anteriores a 2006.21 (1) permiten a atacantes remotos ejecutar código de su elección mediante vectores no especificados en Imailsec y (2) permiten a atacantes remotos tener un impacto desconocido mediante un vector no especificado relativo a "suscribir". • https://www.exploit-db.com/exploits/4228 http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease http://osvdb.org/45818 http://osvdb.org/45819 http://secunia.com/advisories/26123 http://www.securityfocus.com/bid/24962 http://www.securitytracker.com/id?1018421 http://www.vupen.com/english/advisories/2007/2574 https://exchange.xforce.ibmcloud.com/vulnerabilities/35504 https://exchange.xforce.ibmcloud.com/vulnerabilities/35505 •

CVSS: 7.8EPSS: 2%CPEs: 1EXPL: 0

Ipswitch IMail Server 2006 before 2006.21 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving an "overwritten destructor." Ipswitch IMail Server 2006 versiones anteriores a 2006.21 permite a atacantes remotos provocar una denegación de servicio (caída de demonio) mediante vectores no especificados involucrando un "destructor de sobre-escritura". • http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease http://secunia.com/advisories/26123 http://www.vupen.com/english/advisories/2007/2574 •

CVSS: 7.5EPSS: 96%CPEs: 4EXPL: 3

Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character. Desbordamiento de búfer basado en montón en SMTP Daemon en Ipswitch Collaboration 2006 Suite Premium y Standard Editions, IMail, IMail Plus, e IMail Secure, permite a un atacante remoto ejecutar código de su elección a través de una cadena larga situada después del caracter “@” y antes del carácter “: ”. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Ipswitch Collaboration Suite and IMail. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SMTP daemon. A lack of bounds checking during the parsing of long strings contained within the characters '@' and ':' leads to a stack overflow vulnerability. • https://www.exploit-db.com/exploits/2601 https://www.exploit-db.com/exploits/3264 https://www.exploit-db.com/exploits/3265 http://secunia.com/advisories/21795 http://securitytracker.com/id?1016803 http://securitytracker.com/id?1016804 http://www.ipswitch.com/support/ics/updates/ics20061.asp http://www.ipswitch.com/support/imail/releases/im20061.asp http://www.securityfocus.com/archive/1/445521/100/0/threaded http://www.securityfocus.com/bid/19885 http://www.vupen.com& •

CVSS: 4.0EPSS: 18%CPEs: 3EXPL: 0

The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory. • http://secunia.com/advisories/17863 http://securitytracker.com/id?1015318 http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities http://www.securityfocus.com/bid/15753 http://www.vupen.com/english/advisories/2005/2782 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 57%CPEs: 3EXPL: 0

Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands. • http://secunia.com/advisories/17863 http://securitytracker.com/id?1015317 http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp http://www.securityfocus.com/bid/15752 http://www.vupen.com/english/advisories/2005/2782 •