CVE-2002-1893
https://notcve.org/view.php?id=CVE-2002-1893
Cross-site scripting (XSS) vulnerability in ArGoSoft Mail Server Pro 1.8.1.9 allows remote attackers to inject arbitrary web script or HTML via the e-mail message. • http://archives.neohapsis.com/archives/bugtraq/2002-10/0085.html http://www.iss.net/security_center/static/10301.php http://www.securityfocus.com/bid/5906 •
CVE-2002-1004 – ArGoSoft 1.8 Mail Server - Directory Traversal
https://notcve.org/view.php?id=CVE-2002-1004
Directory traversal vulnerability in webmail feature of ArGoSoft Mail Server Plus or Pro 1.8.1.5 and earlier allows remote attackers to read arbitrary files via .. (dot dot) sequences in a URL. • https://www.exploit-db.com/exploits/21591 http://archives.neohapsis.com/archives/bugtraq/2002-07/0029.html http://www.argosoft.com/applications/mailserver/changelist.asp http://www.iss.net/security_center/static/9477.php http://www.securityfocus.com/bid/5144 •
CVE-2002-1005
https://notcve.org/view.php?id=CVE-2002-1005
ArGoSoft Mail Server 1.8.1.7 and earlier allows a webmail user to cause a denial of service (CPU consumption) by forwarding the email to the user while autoresponse is enabled, which creates an infinite loop. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0515.html http://www.iss.net/security_center/static/9759.php http://www.securityfocus.com/bid/5395 •
CVE-2000-1194
https://notcve.org/view.php?id=CVE-2000-1194
Argosoft FRP server 1.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to the (1) USER or (2) CWD commands. • http://www.mdma.za.net/fk/FK9.zip http://www.securityfocus.com/bid/1227 •
CVE-2001-1142 – ArGoSoft FTP Server 1.2.2.2 - Weak Password Encryption
https://notcve.org/view.php?id=CVE-2001-1142
ArGoSoft FTP Server 1.2.2.2 uses weak encryption for user passwords, which allows an attacker with access to the password file to gain privileges. • https://www.exploit-db.com/exploits/21009 http://www.iss.net/security_center/static/6848.php http://www.securityfocus.com/archive/1/196968 http://www.securityfocus.com/bid/3029 •