Page 4 of 49 results (0.003 seconds)

CVSS: 5.3EPSS: 5%CPEs: 3EXPL: 0

12 Oct 2001 — Ipswitch IMail 7.04 and earlier records the physical path of attachments in an e-mail message header, which could allow remote attackers to obtain potentially sensitive configuration information. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html •

CVSS: 8.8EPSS: 1%CPEs: 3EXPL: 0

12 Oct 2001 — The webmail interface for Ipswitch IMail 7.04 and earlier allows remote authenticated users to cause a denial of service (crash) via a mailbox name that contains a large number of . (dot) or other characters to programs such as (1) readmail.cgi or (2) printmail.cgi, possibly due to a buffer overflow that may allow execution of arbitrary code. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

12 Oct 2001 — Directory traversal vulnerability in readmail.cgi for Ipswitch IMail 7.04 and earlier allows remote attackers to access the mailboxes of other users via a .. (dot dot) in the mbx parameter. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

12 Oct 2001 — Ipswitch IMail 7.04 and earlier stores a user's session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html •

CVSS: 9.8EPSS: 6%CPEs: 3EXPL: 1

12 Oct 2001 — Buffer overflow in Web Calendar in Ipswitch IMail 7.04 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request. • https://www.exploit-db.com/exploits/22458 •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

12 Oct 2001 — Ipswitch IMail 7.04 and earlier uses predictable session IDs for authentication, which allows remote attackers to hijack sessions of other users. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html •

CVSS: 9.8EPSS: 11%CPEs: 1EXPL: 1

12 Sep 2001 — Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password. • https://www.exploit-db.com/exploits/19377 •

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 0

27 Jun 2001 — Buffer overflow in IPSwitch IMail SMTP server 6.06 and possibly prior versions allows remote attackers to execute arbitrary code via a long From: header. • http://archives.neohapsis.com/archives/bugtraq/2001-04/0433.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

16 Feb 2001 — IPSwitch IMail 6.0.5 allows remote attackers to cause a denial of service using the SMTP AUTH command by sending a base64-encoded user password whose length is between 80 and 136 bytes. • http://archives.neohapsis.com/archives/bugtraq/2000-12/0071.html •

CVSS: 7.5EPSS: 10%CPEs: 1EXPL: 1

14 Nov 2000 — Ipswitch Imail 6.0 allows remote attackers to cause a denial of service via a large number of connections in which a long Host: header is sent, which causes a thread to crash. • http://archives.neohapsis.com/archives/win2ksecadvice/2000-q3/0071.html •