Vulnerabilities > Ipswitch > Imail Server > High

DATE CVE VULNERABILITY TITLE RISK
2017-10-03 CVE-2017-12639 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ipswitch Imail Server
Stack based buffer overflow in Ipswitch IMail server up to and including 12.5.5 allows remote attackers to execute arbitrary code via unspecified vectors in IMmailSrv, aka ETRE or ETCTERARED.
network
low complexity
ipswitch CWE-119
7.5
2017-10-03 CVE-2017-12638 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Ipswitch Imail Server
Stack based buffer overflow in Ipswitch IMail server up to and including 12.5.5 allows remote attackers to execute arbitrary code via unspecified vectors in IMmailSrv, aka ETBL or ETCETERABLUE.
network
low complexity
ipswitch CWE-119
7.5
2007-10-31 CVE-2007-4345 Buffer Errors vulnerability in Ipswitch Imail Client and Imail Server
Buffer overflow in IMail Client 9.22, as shipped with IPSwitch IMail Server 2006.22, allows remote attackers to execute arbitrary code via a long boundary parameter in a multipart MIME e-mail message.
network
low complexity
ipswitch CWE-119
7.5
2007-07-21 CVE-2007-3926 Denial-Of-Service vulnerability in Ipswitch Imail Server 2006.2
Ipswitch IMail Server 2006 before 2006.21 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving an "overwritten destructor."
network
low complexity
ipswitch
7.8
2005-12-07 CVE-2005-2931 Remote Format String vulnerability in Ipswitch Imail Server and Ipswitch Collaboration Suite
Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands.
network
low complexity
ipswitch
7.5