Vulnerabilities > Ipswitch > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2009-01-27 | CVE-2007-2795 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Ipswitch Imail Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon. | 9.0 |
2008-08-27 | CVE-2008-3795 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Ipswitch WS FTP Home Buffer overflow in Ipswitch WS_FTP Home client allows remote FTP servers to have an unknown impact via a long "message response." | 10.0 |
2008-08-20 | CVE-2008-3734 | USE of Externally-Controlled Format String vulnerability in Ipswitch WS FTP Home and WS FTP PRO Format string vulnerability in Ipswitch WS_FTP Home 2007.0.0.2 and WS_FTP Professional 2007.1.0.0 allows remote FTP servers to cause a denial of service (application crash) or possibly execute arbitrary code via format string specifiers in a connection greeting (response). | 9.3 |
2007-07-21 | CVE-2007-3927 | Buffer Overflow vulnerability in Ipswitch Imail Server and Ipswitch Collaboration Suite Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to "subscribe." | 10.0 |
2007-03-23 | CVE-2007-1637 | Remote Security vulnerability in Imail Premium Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control. | 9.3 |
2005-05-25 | CVE-2005-1256 | Multiple vulnerability in Ipswitch Imail, Imail Server and Ipswitch Collaboration Suite Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name. | 10.0 |
2005-05-25 | CVE-2005-1255 | Multiple vulnerability in Ipswitch Imail, Imail Server and Ipswitch Collaboration Suite Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character. | 10.0 |
2004-11-23 | CVE-2004-0297 | Remote LDAP Daemon Buffer Overflow vulnerability in Ipswitch Imail 8.0.3/8.0.5 Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) in Ipswitch IMail Server 8.03 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via an LDAP message with a large tag length. | 10.0 |
2002-08-12 | CVE-2002-0777 | Buffer Overflow vulnerability in Ipswitch IMail Server LDAP Buffer overflow in the LDAP component of Ipswitch IMail 7.1 and earlier allows remote attackers to execute arbitrary code via a long "bind DN" parameter. | 10.0 |
1999-03-01 | CVE-1999-1046 | Buffer Overflow DoS vulnerability in Ipswitch Imail 5.0 Buffer overflow in IMonitor in IMail 5.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to port 8181. | 10.0 |