Vulnerabilities > Ipswitch > Ipswitch Collaboration Suite > Critical

DATE CVE VULNERABILITY TITLE RISK
2007-07-21 CVE-2007-3927 Buffer Overflow vulnerability in Ipswitch Imail Server and Ipswitch Collaboration Suite
Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to "subscribe."
network
low complexity
ipswitch
critical
10.0
2007-03-23 CVE-2007-1637 Remote Security vulnerability in Imail Premium
Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control.
network
ipswitch
critical
9.3
2005-05-25 CVE-2005-1255 Multiple vulnerability in Ipswitch Imail, Imail Server and Ipswitch Collaboration Suite
Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character.
network
low complexity
ipswitch
critical
10.0
2005-05-25 CVE-2005-1256 Multiple vulnerability in Ipswitch Imail, Imail Server and Ipswitch Collaboration Suite
Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
network
low complexity
ipswitch
critical
10.0