Page 4 of 19 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

IPSwitch IMail 6.0.5 allows remote attackers to cause a denial of service using the SMTP AUTH command by sending a base64-encoded user password whose length is between 80 and 136 bytes. • http://archives.neohapsis.com/archives/bugtraq/2000-12/0071.html http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/2083 https://exchange.xforce.ibmcloud.com/vulnerabilities/5674 •

CVSS: 6.4EPSS: 0%CPEs: 6EXPL: 1

The web server in IPSWITCH IMail 6.04 and earlier allows remote attackers to read and delete arbitrary files via a .. (dot dot) attack. • https://www.exploit-db.com/exploits/20182 http://marc.info/?l=bugtraq&m=96767207207553&w=2 http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/1617 •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Ipswitch IMAIL server 6.02 and earlier allows remote attackers to cause a denial of service via the AUTH CRAM-MD5 command. • http://marc.info/?l=bugtraq&m=95505800117143&w=2 http://support.ipswitch.com/kb/IM-20000208-DM02.htm http://www.securityfocus.com/bid/1094 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi. • https://www.exploit-db.com/exploits/19711 http://www.securityfocus.com/bid/914 •