Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown

CVE-2022-29056

Disclosure Date: March 09, 2023 (last updated November 08, 2023)
A improper restriction of excessive authentication attempts vulnerability [CWE-307] in Fortinet FortiMail version 6.4.0, version 6.2.0 through 6.2.4 and before 6.0.9 allows a remote unauthenticated attacker to partially exhaust CPU and memory via sending numerous HTTP requests to the login form.
Attacker Value
Unknown

CVE-2020-15933

Disclosure Date: January 05, 2022 (last updated February 23, 2025)
A exposure of sensitive information to an unauthorized actor in Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below FortiMail versions 6.4.1 and 6.4.0 allows attacker to obtain potentially sensitive software-version information via client-side resources inspection.
Attacker Value
Unknown

CVE-2021-42757

Disclosure Date: December 08, 2021 (last updated February 23, 2025)
A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments.
Attacker Value
Unknown

CVE-2011-1430

Disclosure Date: March 16, 2011 (last updated October 04, 2023)
The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
0
Attacker Value
Unknown

CVE-2004-2423

Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Unknown vulnerability in the Web calendaring component of Ipswitch IMail Server before 8.13 allows remote attackers to cause a denial of service (crash) via "specific content."
0
Attacker Value
Unknown

CVE-2004-2422

Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Multiple features in Ipswitch IMail Server before 8.13 allow remote attackers to cause a denial of service (crash) via (1) a long sender field to the Queue Manager or (2) a long To field to the Web Messaging component.
0
Attacker Value
Unknown

CVE-2002-1076

Disclosure Date: October 04, 2002 (last updated February 22, 2025)
Buffer overflow in the Web Messaging daemon for Ipswitch IMail before 7.12 allows remote attackers to execute arbitrary code via a long HTTP GET request for HTTP/1.0.
0
Attacker Value
Unknown

CVE-2002-1077

Disclosure Date: October 04, 2002 (last updated February 22, 2025)
IPSwitch IMail Web Calendaring service (iwebcal) allows remote attackers to cause a denial of service (crash) via an HTTP POST request without a Content-Length field.
0
Attacker Value
Unknown

CVE-2002-0777

Disclosure Date: August 12, 2002 (last updated February 22, 2025)
Buffer overflow in the LDAP component of Ipswitch IMail 7.1 and earlier allows remote attackers to execute arbitrary code via a long "bind DN" parameter.
0
Attacker Value
Unknown

CVE-2001-1211

Disclosure Date: December 31, 2001 (last updated February 22, 2025)
Ipswitch IMail 7.0.4 and earlier allows attackers with administrator privileges to read and modify user alias and mailing list information for other domains hosted by the same server via the (1) aliasadmin or (2) listadm1 CGI programs, which do not properly verify that an administrator is the administrator for the target domain.
0