Show filters
90 Total Results
Displaying 41-50 of 90
Sort by:
Attacker Value
Unknown
CVE-2011-1430
Disclosure Date: March 16, 2011 (last updated October 04, 2023)
The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
0
Attacker Value
Unknown
CVE-2007-2795
Disclosure Date: January 27, 2009 (last updated October 04, 2023)
Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon.
0
Attacker Value
Unknown
CVE-2008-5429
Disclosure Date: December 11, 2008 (last updated October 04, 2023)
Incredimail build 5853710 does not properly handle (1) multipart/mixed e-mail messages with many MIME parts and possibly (2) e-mail messages with many "Content-type: message/rfc822;" headers, which allows remote attackers to cause a denial of service (stack consumption or other resource consumption) via a large e-mail message, a related issue to CVE-2006-1173.
0
Attacker Value
Unknown
CVE-2007-4345
Disclosure Date: October 31, 2007 (last updated October 04, 2023)
Buffer overflow in IMail Client 9.22, as shipped with IPSwitch IMail Server 2006.22, allows remote attackers to execute arbitrary code via a long boundary parameter in a multipart MIME e-mail message.
0
Attacker Value
Unknown
CVE-2007-5094
Disclosure Date: September 26, 2007 (last updated October 04, 2023)
Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 through 8.11 allows remote attackers to execute arbitrary code via a set of four different e-mail messages with a long boundary parameter in a certain malformed Content-Type header line, the string "MIME" by itself on a line in the header, and a long Content-Transfer-Encoding header line.
0
Attacker Value
Unknown
CVE-2007-3927
Disclosure Date: July 21, 2007 (last updated October 04, 2023)
Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to "subscribe."
0
Attacker Value
Unknown
CVE-2007-3926
Disclosure Date: July 21, 2007 (last updated October 04, 2023)
Ipswitch IMail Server 2006 before 2006.21 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving an "overwritten destructor."
0
Attacker Value
Unknown
CVE-2007-3925
Disclosure Date: July 21, 2007 (last updated October 04, 2023)
Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
0
Attacker Value
Unknown
CVE-2007-1637
Disclosure Date: March 23, 2007 (last updated October 04, 2023)
Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control.
0
Attacker Value
Unknown
CVE-2006-4379
Disclosure Date: September 08, 2006 (last updated October 04, 2023)
Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character.
0