Cpe Name:
cpe:2.3:a:ipswitch:imail:2006:*:*:*:*:*:*:*
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2011-1430 |
20 |
|
|
2011-03-16 |
2017-08-17 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. |
2 |
CVE-2007-1637 |
|
|
Exec Code Overflow |
2007-03-23 |
2011-03-08 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control. |
3 |
CVE-2005-2160 |
|
|
+Info |
2005-07-06 |
2016-10-18 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
IMail stores usernames and passwords in cleartext in a cookie, which allows remote attackers to obtain sensitive information. |
4 |
CVE-2000-0019 |
|
|
|
1999-03-04 |
2022-08-17 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
IMail POP3 daemon uses weak encryption, which allows local users to read files. |
Total number of vulnerabilities :
4
Page :
1
(This Page)