Vulnerabilities > Ipswitch > Ipswitch Collaboration Suite > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2007-07-21 | CVE-2007-3927 | Buffer Overflow vulnerability in Ipswitch Imail Server and Ipswitch Collaboration Suite Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to "subscribe." | 10.0 |
2007-03-23 | CVE-2007-1637 | Remote Security vulnerability in Imail Premium Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control. | 9.3 |
2005-05-25 | CVE-2005-1255 | Multiple vulnerability in Ipswitch Imail, Imail Server and Ipswitch Collaboration Suite Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character. | 10.0 |
2005-05-25 | CVE-2005-1256 | Multiple vulnerability in Ipswitch Imail, Imail Server and Ipswitch Collaboration Suite Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name. | 10.0 |