CVE-2000-0301
https://notcve.org/view.php?id=CVE-2000-0301
Ipswitch IMAIL server 6.02 and earlier allows remote attackers to cause a denial of service via the AUTH CRAM-MD5 command. • http://marc.info/?l=bugtraq&m=95505800117143&w=2 http://support.ipswitch.com/kb/IM-20000208-DM02.htm http://www.securityfocus.com/bid/1094 •
CVE-2000-0056 – Ipswitch IMail 5.0.8/6.0/6.1 - IMonitor 'status.cgi' Denial of Service
https://notcve.org/view.php?id=CVE-2000-0056
IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi. • https://www.exploit-db.com/exploits/19711 http://www.securityfocus.com/bid/914 •
CVE-1999-1497 – Ipswitch IMail Server 5.0/5.0.5/5.0.6/5.0.7/5.0.8/6.0 - Weak Password Encryption
https://notcve.org/view.php?id=CVE-1999-1497
Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts. • https://www.exploit-db.com/exploits/19683 https://www.exploit-db.com/exploits/401 http://www.securityfocus.com/archive/1/39329 http://www.securityfocus.com/bid/880 •
CVE-2000-0019
https://notcve.org/view.php?id=CVE-2000-0019
IMail POP3 daemon uses weak encryption, which allows local users to read files. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0019 •
CVE-1999-1551 – Ipswitch IMail 5.0/6.0 - Web Service Buffer Overflow (Denial of Service) (PoC)
https://notcve.org/view.php?id=CVE-1999-1551
Buffer overflow in Ipswitch IMail Service 5.0 allows an attacker to cause a denial of service (crash) and possibly execute arbitrary commands via a long URL. • https://www.exploit-db.com/exploits/19380 http://marc.info/?l=bugtraq&m=92038879607336&w=2 http://www.securityfocus.com/bid/505 https://exchange.xforce.ibmcloud.com/vulnerabilities/1898 •