CVE-2001-1280
https://notcve.org/view.php?id=CVE-2001-1280
POP3 Server for Ipswitch IMail 7.04 and earlier generates different responses to valid and invalid user names, which allows remote attackers to determine users on the system. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0076.html http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3424 •
CVE-2001-1286
https://notcve.org/view.php?id=CVE-2001-1286
Ipswitch IMail 7.04 and earlier stores a user's session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html http://online.securityfocus.com/archive/1/261096 http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3432 •
CVE-2001-1282
https://notcve.org/view.php?id=CVE-2001-1282
Ipswitch IMail 7.04 and earlier records the physical path of attachments in an e-mail message header, which could allow remote attackers to obtain potentially sensitive configuration information. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3426 •
CVE-2001-1285
https://notcve.org/view.php?id=CVE-2001-1285
Directory traversal vulnerability in readmail.cgi for Ipswitch IMail 7.04 and earlier allows remote attackers to access the mailboxes of other users via a .. (dot dot) in the mbx parameter. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3432 •
CVE-2001-1283
https://notcve.org/view.php?id=CVE-2001-1283
The webmail interface for Ipswitch IMail 7.04 and earlier allows remote authenticated users to cause a denial of service (crash) via a mailbox name that contains a large number of . (dot) or other characters to programs such as (1) readmail.cgi or (2) printmail.cgi, possibly due to a buffer overflow that may allow execution of arbitrary code. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3427 •