CVE-2002-1077 – IPSwitch IMail 6.x/7.0.x - Web Calendaring Incomplete Post Denial of Service
https://notcve.org/view.php?id=CVE-2002-1077
IPSwitch IMail Web Calendaring service (iwebcal) allows remote attackers to cause a denial of service (crash) via an HTTP POST request without a Content-Length field. • https://www.exploit-db.com/exploits/21673 http://archives.neohapsis.com/archives/bugtraq/2002-07/0399.html http://www.iss.net/security_center/static/9722.php http://www.securityfocus.com/bid/5365 •
CVE-2002-0777
https://notcve.org/view.php?id=CVE-2002-0777
Buffer overflow in the LDAP component of Ipswitch IMail 7.1 and earlier allows remote attackers to execute arbitrary code via a long "bind DN" parameter. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0172.html http://www.iss.net/security_center/static/9116.php http://www.securityfocus.com/bid/4780 •
CVE-2001-1211
https://notcve.org/view.php?id=CVE-2001-1211
Ipswitch IMail 7.0.4 and earlier allows attackers with administrator privileges to read and modify user alias and mailing list information for other domains hosted by the same server via the (1) aliasadmin or (2) listadm1 CGI programs, which do not properly verify that an administrator is the administrator for the target domain. Ipswitch IMail 7.0.4 y versiones anteriores permiten a atacantes con privilegios de administrador, leer y modificar los alias de los usuarios y la información de las listas de correo de otros dominios albergados en el mismo servidor mediante:(1) aliasadmin o(2) programas CGI listadm1, los cuales no verifica adecuadamente que un administrador realmente lo es en ese dominio. • http://support.ipswitch.com/kb/IM-20011219-DM01.htm http://support.ipswitch.com/kb/IM-20020301-DM02.htm http://www.iss.net/security_center/static/7752.php http://www.securityfocus.com/archive/1/247786 http://www.securityfocus.com/bid/3766 •
CVE-2001-1286
https://notcve.org/view.php?id=CVE-2001-1286
Ipswitch IMail 7.04 and earlier stores a user's session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html http://online.securityfocus.com/archive/1/261096 http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3432 •
CVE-2001-1282
https://notcve.org/view.php?id=CVE-2001-1282
Ipswitch IMail 7.04 and earlier records the physical path of attachments in an e-mail message header, which could allow remote attackers to obtain potentially sensitive configuration information. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3426 •