Search
Search Results (49 CVEs found)
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-1999-1171 | 2 Ipswitch, Progress | 2 Imail, Ws Ftp Server | 2025-04-03 | N/A |
IPswitch WS_FTP allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920. | ||||
CVE-1999-1497 | 1 Ipswitch | 1 Imail | 2025-04-03 | N/A |
Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts. | ||||
CVE-1999-1551 | 1 Ipswitch | 1 Imail | 2025-04-03 | N/A |
Buffer overflow in Ipswitch IMail Service 5.0 allows an attacker to cause a denial of service (crash) and possibly execute arbitrary commands via a long URL. | ||||
CVE-1999-1557 | 1 Ipswitch | 1 Imail | 2025-04-03 | N/A |
Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password. | ||||
CVE-2000-0056 | 1 Ipswitch | 1 Imail | 2025-04-03 | N/A |
IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi. | ||||
CVE-2000-0301 | 1 Ipswitch | 1 Imail | 2025-04-03 | N/A |
Ipswitch IMAIL server 6.02 and earlier allows remote attackers to cause a denial of service via the AUTH CRAM-MD5 command. | ||||
CVE-2000-0780 | 1 Ipswitch | 1 Imail | 2025-04-03 | N/A |
The web server in IPSWITCH IMail 6.04 and earlier allows remote attackers to read and delete arbitrary files via a .. (dot dot) attack. | ||||
CVE-2001-1285 | 1 Ipswitch | 1 Imail | 2025-04-03 | N/A |
Directory traversal vulnerability in readmail.cgi for Ipswitch IMail 7.04 and earlier allows remote attackers to access the mailboxes of other users via a .. (dot dot) in the mbx parameter. | ||||
CVE-2001-1286 | 1 Ipswitch | 1 Imail | 2025-04-03 | N/A |
Ipswitch IMail 7.04 and earlier stores a user's session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control. |