Page 24 of 125 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Ipswitch IMAIL server 6.02 and earlier allows remote attackers to cause a denial of service via the AUTH CRAM-MD5 command. • http://marc.info/?l=bugtraq&m=95505800117143&w=2 http://support.ipswitch.com/kb/IM-20000208-DM02.htm http://www.securityfocus.com/bid/1094 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi. • https://www.exploit-db.com/exploits/19711 http://www.securityfocus.com/bid/914 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 4

Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts. • https://www.exploit-db.com/exploits/19683 https://www.exploit-db.com/exploits/401 http://www.securityfocus.com/archive/1/39329 http://www.securityfocus.com/bid/880 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

WS_FTP Pro 6.0 uses weak encryption for passwords in its initialization files, which allows remote attackers to easily decrypt the passwords and gain privileges. • http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9907&L=ntbugtraq&D=0&P=10370&F=P http://www.securityfocus.com/bid/547 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

IMail POP3 daemon uses weak encryption, which allows local users to read files. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0019 •