Show filters
90 Total Results
Displaying 41-50 of 90
Sort by:
Attacker Value
Unknown

CVE-2011-1430

Disclosure Date: March 16, 2011 (last updated October 04, 2023)
The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
0
Attacker Value
Unknown

CVE-2007-2795

Disclosure Date: January 27, 2009 (last updated October 04, 2023)
Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon.
0
Attacker Value
Unknown

CVE-2008-5429

Disclosure Date: December 11, 2008 (last updated October 04, 2023)
Incredimail build 5853710 does not properly handle (1) multipart/mixed e-mail messages with many MIME parts and possibly (2) e-mail messages with many "Content-type: message/rfc822;" headers, which allows remote attackers to cause a denial of service (stack consumption or other resource consumption) via a large e-mail message, a related issue to CVE-2006-1173.
0
Attacker Value
Unknown

CVE-2007-4345

Disclosure Date: October 31, 2007 (last updated October 04, 2023)
Buffer overflow in IMail Client 9.22, as shipped with IPSwitch IMail Server 2006.22, allows remote attackers to execute arbitrary code via a long boundary parameter in a multipart MIME e-mail message.
0
Attacker Value
Unknown

CVE-2007-5094

Disclosure Date: September 26, 2007 (last updated October 04, 2023)
Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 through 8.11 allows remote attackers to execute arbitrary code via a set of four different e-mail messages with a long boundary parameter in a certain malformed Content-Type header line, the string "MIME" by itself on a line in the header, and a long Content-Transfer-Encoding header line.
0
Attacker Value
Unknown

CVE-2007-3927

Disclosure Date: July 21, 2007 (last updated October 04, 2023)
Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to "subscribe."
0
Attacker Value
Unknown

CVE-2007-3926

Disclosure Date: July 21, 2007 (last updated October 04, 2023)
Ipswitch IMail Server 2006 before 2006.21 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving an "overwritten destructor."
0
Attacker Value
Unknown

CVE-2007-3925

Disclosure Date: July 21, 2007 (last updated October 04, 2023)
Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
0
Attacker Value
Unknown

CVE-2007-1637

Disclosure Date: March 23, 2007 (last updated October 04, 2023)
Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control.
0
Attacker Value
Unknown

CVE-2006-4379

Disclosure Date: September 08, 2006 (last updated October 04, 2023)
Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character.
0