Page 2 of 13 results (0.003 seconds)

CVSS: 6.4EPSS: 1%CPEs: 2EXPL: 0

Premium Anti-Spam in Ipswitch IMail Secure Server 2006 and Collaboration Suite 2006 Premium, when using a certain .dat file in the StarEngine /data directory from 20060630 or earlier, does not properly receive and implement bullet signature updates, which allows context-dependent attackers to use the server for spam transmission. Premium Anti-Spam en Ipswitch IMail Secure Server 2006 y Collaboration Suite 2006 Premium, cuando utiliza un cierto archivo .dat en el directorio StarEngine /data desde 20060630 o anteriores, no recibe de forma adecuada e implemente un botón de actualización de firma, la cual permite a atacantes dependientes del contexto utilizar el servidos para hacer envíos de spam. • http://ipswitch.com/support/ics/updates/security_advisory_20060630.asp http://ipswitch.com/support/imail/releases/security_advisory_20060630.asp http://securitytracker.com/id?1016419 http://securitytracker.com/id?1016420 http://www.vupen.com/english/advisories/2006/2653 •

CVSS: 6.5EPSS: 14%CPEs: 2EXPL: 0

Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Ipswitch Collaboration Suite. Authentication is required to exploit this vulnerability. This specific flaw exists within the IMAP daemon. A lack of bounds checking during the parsing of long arguments to the FETCH verb can result in an exploitable buffer overflow. • http://secunia.com/advisories/19168 http://securityreason.com/securityalert/577 http://securitytracker.com/id?1015759 http://www.ipswitch.com/support/ics/updates/ics200603prem.asp http://www.osvdb.org/23796 http://www.securityfocus.com/archive/1/427536/100/0/threaded http://www.securityfocus.com/bid/17063 http://www.vupen.com/english/advisories/2006/0907 http://www.zerodayinitiative.com/advisories/ZDI-06-003.html https://exchange.xforce.ibmcloud.com/vulnerabilities/25133 •

CVSS: 4.0EPSS: 64%CPEs: 3EXPL: 0

The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory. • http://secunia.com/advisories/17863 http://securitytracker.com/id?1015318 http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities http://www.securityfocus.com/bid/15753 http://www.vupen.com/english/advisories/2005/2782 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 86%CPEs: 3EXPL: 0

Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands. • http://secunia.com/advisories/17863 http://securitytracker.com/id?1015317 http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp http://www.securityfocus.com/bid/15752 http://www.vupen.com/english/advisories/2005/2782 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop. • http://securitytracker.com/id?1014047 http://www.idefense.com/application/poi/display?id=245&type=vulnerabilities http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html http://www.securityfocus.com/bid/13727 •