CVE-2001-1283
https://notcve.org/view.php?id=CVE-2001-1283
The webmail interface for Ipswitch IMail 7.04 and earlier allows remote authenticated users to cause a denial of service (crash) via a mailbox name that contains a large number of . (dot) or other characters to programs such as (1) readmail.cgi or (2) printmail.cgi, possibly due to a buffer overflow that may allow execution of arbitrary code. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0082.html http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/3427 •
CVE-1999-1557 – Ipswitch IMail 5.0 - Imapd Buffer Overflow (Denial of Service) (PoC)
https://notcve.org/view.php?id=CVE-1999-1557
Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password. • https://www.exploit-db.com/exploits/19377 http://marc.info/?l=bugtraq&m=92038879607336&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/1895 •
CVE-2001-0494
https://notcve.org/view.php?id=CVE-2001-0494
Buffer overflow in IPSwitch IMail SMTP server 6.06 and possibly prior versions allows remote attackers to execute arbitrary code via a long From: header. • http://archives.neohapsis.com/archives/bugtraq/2001-04/0433.html http://ipswitch.com/Support/IMail/news.html http://www.osvdb.org/5610 https://exchange.xforce.ibmcloud.com/vulnerabilities/6445 •
CVE-2001-0039
https://notcve.org/view.php?id=CVE-2001-0039
IPSwitch IMail 6.0.5 allows remote attackers to cause a denial of service using the SMTP AUTH command by sending a base64-encoded user password whose length is between 80 and 136 bytes. • http://archives.neohapsis.com/archives/bugtraq/2000-12/0071.html http://www.ipswitch.com/Support/IMail/news.html http://www.securityfocus.com/bid/2083 https://exchange.xforce.ibmcloud.com/vulnerabilities/5674 •
CVE-2000-0825
https://notcve.org/view.php?id=CVE-2000-0825
Ipswitch Imail 6.0 allows remote attackers to cause a denial of service via a large number of connections in which a long Host: header is sent, which causes a thread to crash. • http://archives.neohapsis.com/archives/win2ksecadvice/2000-q3/0071.html http://marc.info/?l=bugtraq&m=96659012127444&w=2 http://marc.info/?l=ntbugtraq&m=96654521004571&w=2 http://www.securityfocus.com/bid/2011 https://exchange.xforce.ibmcloud.com/vulnerabilities/5475 •