Search Results (49 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-1999-1497 1 Ipswitch 1 Imail 2025-04-03 N/A
Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts.
CVE-1999-1551 1 Ipswitch 1 Imail 2025-04-03 N/A
Buffer overflow in Ipswitch IMail Service 5.0 allows an attacker to cause a denial of service (crash) and possibly execute arbitrary commands via a long URL.
CVE-1999-1557 1 Ipswitch 1 Imail 2025-04-03 N/A
Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
CVE-2000-0019 1 Ipswitch 1 Imail 2025-04-03 N/A
IMail POP3 daemon uses weak encryption, which allows local users to read files.
CVE-2000-0056 1 Ipswitch 1 Imail 2025-04-03 N/A
IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi.
CVE-2000-0780 1 Ipswitch 1 Imail 2025-04-03 N/A
The web server in IPSWITCH IMail 6.04 and earlier allows remote attackers to read and delete arbitrary files via a .. (dot dot) attack.
CVE-2000-0825 1 Ipswitch 1 Imail 2025-04-03 N/A
Ipswitch Imail 6.0 allows remote attackers to cause a denial of service via a large number of connections in which a long Host: header is sent, which causes a thread to crash.
CVE-2001-0039 1 Ipswitch 1 Imail 2025-04-03 N/A
IPSwitch IMail 6.0.5 allows remote attackers to cause a denial of service using the SMTP AUTH command by sending a base64-encoded user password whose length is between 80 and 136 bytes.
CVE-2001-1286 1 Ipswitch 1 Imail 2025-04-03 N/A
Ipswitch IMail 7.04 and earlier stores a user's session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control.