Page 5 of 49 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Stack-based buffer overflow in Ipswitch IMail Express Web Messaging before 8.05 might allow remote attackers to execute arbitrary code via an HTML message with long "tag text." • http://secunia.com/advisories/11352 http://support.ipswitch.com/kb/IM-20031219-DF01.htm http://www.osvdb.org/5243 http://www.securityfocus.com/bid/10106 https://exchange.xforce.ibmcloud.com/vulnerabilities/15841 •

CVSS: 5.0EPSS: 0%CPEs: 28EXPL: 0

Unknown vulnerability in the Web calendaring component of Ipswitch IMail Server before 8.13 allows remote attackers to cause a denial of service (crash) via "specific content." • http://secunia.com/advisories/12453 http://securitytracker.com/id?1011146 http://support.ipswitch.com/kb/IM-20040902-DM01.htm#FIXES http://www.osvdb.org/9553 http://www.securityfocus.com/bid/11106 https://exchange.xforce.ibmcloud.com/vulnerabilities/17220 •

CVSS: 4.6EPSS: 96%CPEs: 1EXPL: 4

Stack-based buffer overflow in IPSwitch IMail 8.13 allows remote authenticated users to execute arbitrary code via a long IMAP DELETE command. • https://www.exploit-db.com/exploits/16479 https://www.exploit-db.com/exploits/627 https://www.exploit-db.com/exploits/1151 http://marc.info/?l=bugtraq&m=110037283803560&w=2 http://secunia.com/advisories/13200 http://www.securityfocus.com/bid/11675 https://exchange.xforce.ibmcloud.com/vulnerabilities/18058 •

CVSS: 10.0EPSS: 93%CPEs: 2EXPL: 3

Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) in Ipswitch IMail Server 8.03 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via an LDAP message with a large tag length. Desbordamiento de búfer en el demonio Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) de Ipswitch IMail Server 8.03 permite a atacantes remotos causar una denegación de servicio (caída) y ejecutar código de su elección mediante un mensaje LDAP con una etiqueta de longitud larga. • https://www.exploit-db.com/exploits/157 https://www.exploit-db.com/exploits/16824 http://www.idefense.com/application/poi/display?id=74 http://www.ipswitch.com/support/imail/releases/imail_professional/im805HF2.html http://www.kb.cert.org/vuls/id/972334 http://www.osvdb.org/3984 http://www.securityfocus.com/bid/9682 https://exchange.xforce.ibmcloud.com/vulnerabilities/15243 •

CVSS: 7.5EPSS: 9%CPEs: 12EXPL: 2

Buffer overflow in the Web Messaging daemon for Ipswitch IMail before 7.12 allows remote attackers to execute arbitrary code via a long HTTP GET request for HTTP/1.0. • https://www.exploit-db.com/exploits/21654 http://archives.neohapsis.com/archives/bugtraq/2002-07/0326.html http://archives.neohapsis.com/archives/bugtraq/2002-07/0363.html http://archives.neohapsis.com/archives/bugtraq/2002-07/0368.html http://support.ipswitch.com/kb/IM-20020729-DM01.htm http://support.ipswitch.com/kb/IM-20020731-DM02.htm http://www.iss.net/security_center/static/9679.php http://www.securityfocus.com/bid/5323 •