Vulnerabilities > CVE-2000-0056 - Unspecified vulnerability in Ipswitch Imail 5.0.8/6.0/6.1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Exploit-Db
description | Ipswitch IMail 5.0.8/6.0/6.1 IMonitor status.cgi DoS Vulnerability. CVE-2000-0056. Dos exploit for windows platform |
id | EDB-ID:19711 |
last seen | 2016-02-02 |
modified | 2000-01-05 |
published | 2000-01-05 |
reporter | Ussr Labs |
source | https://www.exploit-db.com/download/19711/ |
title | Ipswitch IMail 5.0.8/6.0/6.1 IMonitor status.cgi DoS Vulnerability |
Nessus
NASL family | Gain a shell remotely |
NASL id | IMAIL_IMONITOR_OVERFLOW.NASL |
description | The remote host appears to be running IMail IMAP server.The installed version is reportedly affected by a buffer overflow vulnerability in the IMonitor. An attacker could exploit this flaw in order to cause a denial of service or potentially execute arbitrary code subject to the privileges of the affected service. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10124 |
published | 1999-06-22 |
reporter | This script is Copyright (C) 1999-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10124 |
title | IMail IMonitor Service Remote Overflow |
code |
|