Ipswitch

Ipswitch Collaboration Suite

13 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.55%
  • Published 24.07.2007 18:30:00
  • Last modified 09.04.2025 00:30:58

The IM Server (aka IMserve or IMserver) 2.0.5.30 and probably earlier in Ipswitch Instant Messaging before 2.07 in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (daemon crash) via certain data to TCP port 517...

  • EPSS 90.44%
  • Published 21.07.2007 00:30:00
  • Last modified 09.04.2025 00:30:58

Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.

  • EPSS 72.67%
  • Published 21.07.2007 00:30:00
  • Last modified 09.04.2025 00:30:58

Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to "su...

  • EPSS 0.34%
  • Published 23.03.2007 22:19:00
  • Last modified 09.04.2025 00:30:58

Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Syn...

  • EPSS 56.86%
  • Published 08.09.2006 21:04:00
  • Last modified 03.04.2025 01:03:51

Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character ...

  • EPSS 0.16%
  • Published 13.07.2006 00:05:00
  • Last modified 03.04.2025 01:03:51

Premium Anti-Spam in Ipswitch IMail Secure Server 2006 and Collaboration Suite 2006 Premium, when using a certain .dat file in the StarEngine /data directory from 20060630 or earlier, does not properly receive and implement bullet signature updates, ...

  • EPSS 1.44%
  • Published 31.12.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command.

  • EPSS 5.25%
  • Published 07.12.2005 01:03:00
  • Last modified 03.04.2025 01:03:51

The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory.

  • EPSS 14.47%
  • Published 07.12.2005 01:03:00
  • Last modified 03.04.2025 01:03:51

Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RC...

  • EPSS 1.13%
  • Published 25.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.