Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown
CVE-2012-0269
Disclosure Date: April 27, 2012 (last updated October 04, 2023)
Buffer overflow in JustSystems Ichitaro 2011 Sou, Ichitaro 2006 through 2011, Ichitaro Government 2006 through 2010, Ichitaro Portable with oreplug, Ichitaro Viewer, JUST School, JUST School 2009 and 2010, JUST Jump 4, JUST Frontier, oreplug, Shuriken Pro4, Shuriken 2007 through 2010, Shuriken Pro4 Corporate Edition, Shuriken CE/2007 through CE/2009 Corporate Edition, Shuriken 2010 Corporate Edition, Rekishimail Sengokubusho no missho, and Bakumatsushishi no missho allows remote attackers to execute arbitrary code via a crafted image file.
0
Attacker Value
Unknown
CVE-2011-1430
Disclosure Date: March 16, 2011 (last updated October 04, 2023)
The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
0
Attacker Value
Unknown
CVE-2007-2795
Disclosure Date: January 27, 2009 (last updated October 04, 2023)
Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon.
0
Attacker Value
Unknown
CVE-2007-4345
Disclosure Date: October 31, 2007 (last updated October 04, 2023)
Buffer overflow in IMail Client 9.22, as shipped with IPSwitch IMail Server 2006.22, allows remote attackers to execute arbitrary code via a long boundary parameter in a multipart MIME e-mail message.
0
Attacker Value
Unknown
CVE-2007-3926
Disclosure Date: July 21, 2007 (last updated October 04, 2023)
Ipswitch IMail Server 2006 before 2006.21 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving an "overwritten destructor."
0
Attacker Value
Unknown
CVE-2007-1637
Disclosure Date: March 23, 2007 (last updated October 04, 2023)
Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control.
0
Attacker Value
Unknown
CVE-2006-4379
Disclosure Date: September 08, 2006 (last updated October 04, 2023)
Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character.
0
Attacker Value
Unknown
CVE-2005-2160
Disclosure Date: July 06, 2005 (last updated February 22, 2025)
IMail stores usernames and passwords in cleartext in a cookie, which allows remote attackers to obtain sensitive information.
0
Attacker Value
Unknown
CVE-2000-0019
Disclosure Date: March 04, 1999 (last updated February 22, 2025)
IMail POP3 daemon uses weak encryption, which allows local users to read files.
0