
CVE-2011-1430
https://notcve.org/view.php?id=CVE-2011-1430
16 Mar 2011 — The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. La implementación del servidor Ipswitch IMail v11.03 no restringe el búfer I/O de forma adecuada, lo que permite a los atacantes "man-in-the-middl... • http://secunia.com/advisories/43676 • CWE-20: Improper Input Validation •

CVE-2007-2795 – Ipswitch IMail IMAP Daemon SUBSCRIBE Stack Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-2795
19 Jul 2007 — Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon. Múltiple desbordamiento de búfer en Ipswitch IMail en versiones anteriores a 2006.21, permite a los atacantes remotos o usuarios autenticados ejecutar arbitrariamente código ... • https://www.exploit-db.com/exploits/9662 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2005-1252
https://notcve.org/view.php?id=CVE-2005-1252
25 May 2005 — Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file. • http://securitytracker.com/id?1014047 •

CVE-2005-1254
https://notcve.org/view.php?id=CVE-2005-1254
25 May 2005 — Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument. • http://securitytracker.com/id?1014047 •

CVE-2005-1255 – IPSwitch IMail Server 8.15 - IMAPD Remote Code Execution
https://notcve.org/view.php?id=CVE-2005-1255
25 May 2005 — Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character. • https://www.exploit-db.com/exploits/1124 •

CVE-2005-1256
https://notcve.org/view.php?id=CVE-2005-1256
25 May 2005 — Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name. • http://securitytracker.com/id?1014047 •

CVE-2004-1520 – IPSwitch IMail IMAP4D - Delete Overflow
https://notcve.org/view.php?id=CVE-2004-1520
31 Dec 2004 — Stack-based buffer overflow in IPSwitch IMail 8.13 allows remote authenticated users to execute arbitrary code via a long IMAP DELETE command. • https://www.exploit-db.com/exploits/16479 •