7 results (0.003 seconds)

CVSS: 8.1EPSS: 0%CPEs: 47EXPL: 0

16 Mar 2011 — The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. La implementación del servidor Ipswitch IMail v11.03 no restringe el búfer I/O de forma adecuada, lo que permite a los atacantes "man-in-the-middl... • http://secunia.com/advisories/43676 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 49%CPEs: 2EXPL: 1

19 Jul 2007 — Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon. Múltiple desbordamiento de búfer en Ipswitch IMail en versiones anteriores a 2006.21, permite a los atacantes remotos o usuarios autenticados ejecutar arbitrariamente código ... • https://www.exploit-db.com/exploits/9662 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

23 Mar 2007 — Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control. Múltiples desbordamientos de búfer en el control ActiveX IMAILAPILib (IMailAPI.dll) en Ipswitch IMail Server anterior a 2006.2 per... • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=487 •

CVSS: 9.8EPSS: 57%CPEs: 4EXPL: 3

08 Sep 2006 — Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character. Desbordamiento de búfer basado en montón en SMTP Daemon en Ipswitch Collaboration 2006 Suite Premium y Standard Editions, IMail, IMail Plus, e IMail Secure, permite a un atacante remoto ejecutar código de su elección a través de una c... • https://www.exploit-db.com/exploits/2601 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

06 Jul 2005 — IMail stores usernames and passwords in cleartext in a cookie, which allows remote attackers to obtain sensitive information. • http://marc.info/?l=bugtraq&m=112060187204457&w=2 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 6.5EPSS: 5%CPEs: 3EXPL: 0

25 May 2005 — Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument. • http://securitytracker.com/id?1014047 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

04 Mar 1999 — IMail POP3 daemon uses weak encryption, which allows local users to read files. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0019 •