CVE-2001-1282
https://notcve.org/view.php?id=CVE-2001-1282
Ipswitch IMail 7.04 and earlier records the physical path of attachments in an e-mail message header, which could allow remote attackers to obtain potentially sensitive configuration information. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3426 •
CVE-2001-1285
https://notcve.org/view.php?id=CVE-2001-1285
Directory traversal vulnerability in readmail.cgi for Ipswitch IMail 7.04 and earlier allows remote attackers to access the mailboxes of other users via a .. (dot dot) in the mbx parameter. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3432 •
CVE-2001-1280
https://notcve.org/view.php?id=CVE-2001-1280
POP3 Server for Ipswitch IMail 7.04 and earlier generates different responses to valid and invalid user names, which allows remote attackers to determine users on the system. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0076.html http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3424 •
CVE-2001-1287 – Linux Kernel 2.2.x/2.4.x - I/O System Call File Existence
https://notcve.org/view.php?id=CVE-2001-1287
Buffer overflow in Web Calendar in Ipswitch IMail 7.04 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request. • https://www.exploit-db.com/exploits/22458 http://archives.neohapsis.com/archives/bugtraq/2001-10/0083.html http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3431 •
CVE-2001-1281
https://notcve.org/view.php?id=CVE-2001-1281
Web Messaging Server for Ipswitch IMail 7.04 and earlier allows remote authenticated users to change information for other users by modifying the olduser parameter in the "Change User Information" web form. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0076.html http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3429 •