Page 9 of 125 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

25 May 2005 — Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file. • http://securitytracker.com/id?1014047 •

CVSS: 6.5EPSS: 5%CPEs: 3EXPL: 0

25 May 2005 — Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument. • http://securitytracker.com/id?1014047 •

CVSS: 10.0EPSS: 7%CPEs: 4EXPL: 3

25 May 2005 — Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character. • https://www.exploit-db.com/exploits/1124 •

CVSS: 10.0EPSS: 80%CPEs: 3EXPL: 0

25 May 2005 — Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name. • http://securitytracker.com/id?1014047 •

CVSS: 8.8EPSS: 11%CPEs: 1EXPL: 0

10 Mar 2005 — Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) before 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command. • http://secunia.com/advisories/14546 •

CVSS: 8.8EPSS: 89%CPEs: 1EXPL: 4

31 Dec 2004 — Stack-based buffer overflow in IPSwitch IMail 8.13 allows remote authenticated users to execute arbitrary code via a long IMAP DELETE command. • https://www.exploit-db.com/exploits/16479 •

CVSS: 7.5EPSS: 3%CPEs: 20EXPL: 3

31 Dec 2004 — Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file. • http://marc.info/?l=bugtraq&m=108006717731989&w=2 • CWE-399: Resource Management Errors •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

31 Dec 2004 — Stack-based buffer overflow in Ipswitch IMail Express Web Messaging before 8.05 might allow remote attackers to execute arbitrary code via an HTML message with long "tag text." • http://secunia.com/advisories/11352 •

CVSS: 7.5EPSS: 0%CPEs: 28EXPL: 0

31 Dec 2004 — Multiple features in Ipswitch IMail Server before 8.13 allow remote attackers to cause a denial of service (crash) via (1) a long sender field to the Queue Manager or (2) a long To field to the Web Messaging component. • http://secunia.com/advisories/12453 •

CVSS: 7.5EPSS: 0%CPEs: 28EXPL: 0

31 Dec 2004 — Unknown vulnerability in the Web calendaring component of Ipswitch IMail Server before 8.13 allows remote attackers to cause a denial of service (crash) via "specific content." • http://secunia.com/advisories/12453 •