Vulnerabilites related to ipswitch - ipswitch_collaboration_suite
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) before 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ipswitch | ipswitch_collaboration_suite | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD392FB9-AC56-40A1-AF5D-A9383979AB0B", "versionEndIncluding": "8.15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) before 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command." } ], "id": "CVE-2005-0707", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/14546" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1013410" }, { "source": "cve@mitre.org", "url": "http://www.idefense.com/application/poi/display?id=216\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/12780" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/14546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1013410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.idefense.com/application/poi/display?id=216\u0026type=vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/12780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19655" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-13 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
Premium Anti-Spam in Ipswitch IMail Secure Server 2006 and Collaboration Suite 2006 Premium, when using a certain .dat file in the StarEngine /data directory from 20060630 or earlier, does not properly receive and implement bullet signature updates, which allows context-dependent attackers to use the server for spam transmission.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ipswitch | ipswitch_collaboration_suite | 2006_premium | |
ipswitch | ipswitch_secure_server | 2006_premium |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2006_premium:*:*:*:*:*:*:*", "matchCriteriaId": "4031612D-7151-45DF-9AF6-7DEA14FA13B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_secure_server:2006_premium:*:*:*:*:*:*:*", "matchCriteriaId": "827553B6-5D12-4D0B-A907-B1208A08D8FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Premium Anti-Spam in Ipswitch IMail Secure Server 2006 and Collaboration Suite 2006 Premium, when using a certain .dat file in the StarEngine /data directory from 20060630 or earlier, does not properly receive and implement bullet signature updates, which allows context-dependent attackers to use the server for spam transmission." }, { "lang": "es", "value": "Premium Anti-Spam en Ipswitch IMail Secure Server 2006 y Collaboration Suite 2006 Premium, cuando utiliza un cierto archivo .dat en el directorio StarEngine /data desde 20060630 o anteriores, no recibe de forma adecuada e implemente un bot\u00f3n de actualizaci\u00f3n de firma, la cual permite a atacantes dependientes del contexto utilizar el servidos para hacer env\u00edos de spam." } ], "id": "CVE-2006-3552", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-13T00:05:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://ipswitch.com/support/ics/updates/security_advisory_20060630.asp" }, { "source": "cve@mitre.org", "url": "http://ipswitch.com/support/imail/releases/security_advisory_20060630.asp" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016419" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016420" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/2653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ipswitch.com/support/ics/updates/security_advisory_20060630.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ipswitch.com/support/imail/releases/security_advisory_20060630.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/2653" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-21 00:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ipswitch | imail_server | * | |
ipswitch | ipswitch_collaboration_suite | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:imail_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "B64F51E1-D2B5-4E9D-962E-2DCD2B82919B", "versionEndIncluding": "2006.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEFD422E-19B4-4789-BA0D-42C90C4A5AE9", "versionEndIncluding": "2006.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en el servicio IMAP (imapd32.exe) de Ipswitch IMail Server 2006 versiones anteriores a 2006.21 permiten a atacantes remotos autenticados ejecutar c\u00f3digo de su elecci\u00f3n mediante el comando (1) Search \u00f3 (2) Search Charset." } ], "id": "CVE-2007-3925", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-21T00:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease" }, { "source": "cve@mitre.org", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26123" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/24962" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018419" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2574" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35496" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/24962" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2574" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35500" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ipswitch | ipswitch_collaboration_suite | 2006.02_premium | |
ipswitch | ipswitch_collaboration_suite | 2006.02_standard |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2006.02_premium:*:*:*:*:*:*:*", "matchCriteriaId": "ACA7F7E4-4023-4B94-AEEE-5D658F0F5AAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2006.02_standard:*:*:*:*:*:*:*", "matchCriteriaId": "CC104EA1-FCF0-4807-B4BA-736EF388C6A2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command." } ], "id": "CVE-2005-3526", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19168" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/577" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015759" }, { "source": "cve@mitre.org", "url": "http://www.ipswitch.com/support/ics/updates/ics200603prem.asp" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/23796" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/427536/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/17063" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0907" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-003.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/577" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ipswitch.com/support/ics/updates/ics200603prem.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/23796" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/427536/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0907" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25133" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-25 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ipswitch | imail | 8.12 | |
ipswitch | imail | 8.13 | |
ipswitch | imail_server | * | |
ipswitch | ipswitch_collaboration_suite | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:imail:8.12:*:*:*:*:*:*:*", "matchCriteriaId": "2802265F-2CFD-4AB4-84BF-EAD5E0CA5366", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:imail:8.13:*:*:*:*:*:*:*", "matchCriteriaId": "443C3EE1-1C98-40F6-93DD-F60BD0C46C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:imail_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8FF3313-6C45-44C5-B093-E865AB16BAB9", "versionEndIncluding": "8.2_hotfix_2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C28E243-026F-4252-9D80-4D69C50467D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character." } ], "id": "CVE-2005-1255", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-25T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014047" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=243\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/13727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=243\u0026type=vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/13727" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-07 01:03
Modified
2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ipswitch | imail_server | 8.20 | |
ipswitch | ipswitch_collaboration_suite | 2.0 | |
ipswitch | ipswitch_collaboration_suite | 2.01 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:imail_server:8.20:*:*:*:*:*:*:*", "matchCriteriaId": "188ADF5A-00A4-4608-A9F9-EDF61CEFAA20", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEC4E630-46A4-4C8F-9D73-F8B7241F4795", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "59B7AA85-5A6A-4D40-8ACA-26A6C2FBDACC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands." } ], "id": "CVE-2005-2931", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-07T01:03:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/17863" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015317" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=346\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/15752" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/17863" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015317" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=346\u0026type=vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/15752" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2782" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-25 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ipswitch | imail | 8.13 | |
ipswitch | imail_server | * | |
ipswitch | ipswitch_collaboration_suite | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:imail:8.13:*:*:*:*:*:*:*", "matchCriteriaId": "443C3EE1-1C98-40F6-93DD-F60BD0C46C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:imail_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8FF3313-6C45-44C5-B093-E865AB16BAB9", "versionEndIncluding": "8.2_hotfix_2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C28E243-026F-4252-9D80-4D69C50467D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name." } ], "id": "CVE-2005-1256", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-25T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014047" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=244\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/13727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=244\u0026type=vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/13727" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-25 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ipswitch | ipswitch_collaboration_suite | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C28E243-026F-4252-9D80-4D69C50467D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop." } ], "id": "CVE-2005-1249", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-25T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014047" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=245\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/13727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=245\u0026type=vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/13727" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-23 22:19
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ipswitch | imail | 2006 | |
ipswitch | imail_plus | 2006 | |
ipswitch | imail_premium | 2006 | |
ipswitch | ipswitch_collaboration_suite | 2006_standard |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:imail:2006:*:*:*:*:*:*:*", "matchCriteriaId": "81B286D0-4168-41FF-AC1F-4E65C3AD7DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:imail_plus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "F0C6A165-8B6B-4D0F-B2F7-3A5CDA4BA072", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:imail_premium:2006:*:*:*:*:*:*:*", "matchCriteriaId": "635D04E6-0347-4858-B8F4-AC7BD3565E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2006_standard:*:*:*:*:*:*:*", "matchCriteriaId": "95104B1C-0B67-43FF-A93C-9296707B3DA9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en el control ActiveX IMAILAPILib (IMailAPI.dll) en Ipswitch IMail Server anterior a 2006.2 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de los miembros (1) WebConnect y (2) Connect en el control (a)IMailServer; miembros (3) Sync3 y (4) Init3 en el control (b) IMailLDAPService y el miembro (5) SetReplyTo en el control (c)IMailUserCollection." } ], "evaluatorSolution": "Upgrade to version 2006.2.", "id": "CVE-2007-1637", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-03-23T22:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=487" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24422" }, { "source": "cve@mitre.org", "url": "http://support.ipswitch.com/kb/IM-20070305-JH01.htm" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1017737" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0853" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.ipswitch.com/kb/IM-20070305-JH01.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1017737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0853" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-24 18:30
Modified
2025-04-09 00:30
Severity ?
Summary
The IM Server (aka IMserve or IMserver) 2.0.5.30 and probably earlier in Ipswitch Instant Messaging before 2.07 in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (daemon crash) via certain data to TCP port 5179 that overwrites a destructor, as reachable by the (1) DoAttachVideoSender, (2) DoAttachVideoReceiver, (3) DoAttachAudioSender, and (4) DoAttachAudioReceiver functions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ipswitch | imserver | 2.0.5.30 | |
ipswitch | ipswitch_collaboration_suite | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:imserver:2.0.5.30:*:*:*:*:*:*:*", "matchCriteriaId": "C4C3FE76-66E3-4758-8110-D065A46C7444", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "4029080C-ABDC-411F-9834-1670C85F3F89", "versionEndIncluding": "2.07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IM Server (aka IMserve or IMserver) 2.0.5.30 and probably earlier in Ipswitch Instant Messaging before 2.07 in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (daemon crash) via certain data to TCP port 5179 that overwrites a destructor, as reachable by the (1) DoAttachVideoSender, (2) DoAttachVideoReceiver, (3) DoAttachAudioSender, and (4) DoAttachAudioReceiver functions." }, { "lang": "es", "value": "El IM Server (tambi\u00e9n conocido como a IMserve or IMserver) 2.0.5.30 y probablemente versiones anteriores en Ipswitch Instant Messaging versiones anteriores a 2.07 en Ipswitch Collaboration Suite (ICS) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de demonio) mediante determinados datos al puerto TCP 5179 que sobre-escribe un destructor, como se puede reproducir con las funciones (1) DoAttachVideoSender, (2) DoAttachVideoReceiver, (3) DoAttachAudioSender, y (4) DoAttachAudioReceiver" } ], "id": "CVE-2007-3959", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-24T18:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=566" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26154" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.ipswitch.com/support/instant_messaging/patch-upgrades.asp" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25031" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018440" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2621" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.ipswitch.com/support/instant_messaging/patch-upgrades.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2621" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-21 00:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to "subscribe."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ipswitch | imail_server | * | |
ipswitch | ipswitch_collaboration_suite | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:imail_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "B64F51E1-D2B5-4E9D-962E-2DCD2B82919B", "versionEndIncluding": "2006.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEFD422E-19B4-4789-BA0D-42C90C4A5AE9", "versionEndIncluding": "2006.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to \"subscribe.\"" }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en Ipswitch IMail Server 2006 versiones anteriores a 2006.21 (1) permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados en Imailsec y (2) permiten a atacantes remotos tener un impacto desconocido mediante un vector no especificado relativo a \"suscribir\"." } ], "id": "CVE-2007-3927", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-21T00:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/45818" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/45819" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26123" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/24962" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018421" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2574" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35504" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/45818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/45819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/24962" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2574" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35504" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35505" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-07 01:03
Modified
2025-04-03 01:03
Severity ?
Summary
The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ipswitch | imail_server | 8.20 | |
ipswitch | ipswitch_collaboration_suite | 2.0 | |
ipswitch | ipswitch_collaboration_suite | 2.01 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:imail_server:8.20:*:*:*:*:*:*:*", "matchCriteriaId": "188ADF5A-00A4-4608-A9F9-EDF61CEFAA20", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEC4E630-46A4-4C8F-9D73-F8B7241F4795", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "59B7AA85-5A6A-4D40-8ACA-26A6C2FBDACC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory." } ], "id": "CVE-2005-2923", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-07T01:03:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/17863" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015318" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=347\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/15753" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/17863" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=347\u0026type=vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/15753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2782" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-09-08 21:04
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ipswitch | imail_plus | 2006 | |
ipswitch | imail_secure_server | 2006 | |
ipswitch | ipswitch_collaboration_suite | 2006_premium | |
ipswitch | ipswitch_collaboration_suite | 2006_standard |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ipswitch:imail_plus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "F0C6A165-8B6B-4D0F-B2F7-3A5CDA4BA072", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:imail_secure_server:2006:*:*:*:*:*:*:*", "matchCriteriaId": "A01A5A7C-A405-4A3A-860C-7B954011A9B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2006_premium:*:*:*:*:*:*:*", "matchCriteriaId": "4031612D-7151-45DF-9AF6-7DEA14FA13B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2006_standard:*:*:*:*:*:*:*", "matchCriteriaId": "95104B1C-0B67-43FF-A93C-9296707B3DA9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an \u0027@\u0027 character and before a \u0027:\u0027 character." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en mont\u00f3n en SMTP Daemon en Ipswitch Collaboration 2006 Suite Premium y Standard Editions, IMail, IMail Plus, e IMail Secure, permite a un atacante remoto ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una cadena larga situada despu\u00e9s del caracter \u201c@\u201d y antes del car\u00e1cter \u201c: \u201d." } ], "id": "CVE-2006-4379", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-09-08T21:04:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21795" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016803" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016804" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.ipswitch.com/support/ics/updates/ics20061.asp" }, { "source": "cve@mitre.org", "url": "http://www.ipswitch.com/support/imail/releases/im20061.asp" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/445521/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19885" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3496" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-028.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.ipswitch.com/support/ics/updates/ics20061.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ipswitch.com/support/imail/releases/im20061.asp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/445521/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28789" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2005-1249 (GCVE-0-2005-1249)
Vulnerability from cvelistv5
Published
2005-05-25 04:00
Modified
2024-08-07 21:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
References
▼ | URL | Tags |
---|---|---|
http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/13727 | vdb-entry, x_refsource_BID | |
http://www.idefense.com/application/poi/display?id=245&type=vulnerabilities | third-party-advisory, x_refsource_IDEFENSE | |
http://securitytracker.com/id?1014047 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:44:05.434Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "name": "13727", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13727" }, { "name": "20050524 Ipswitch IMail IMAP LSUB DoS Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=245\u0026type=vulnerabilities" }, { "name": "1014047", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014047" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-05-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-06-04T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "name": "13727", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13727" }, { "name": "20050524 Ipswitch IMail IMAP LSUB DoS Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=245\u0026type=vulnerabilities" }, { "name": "1014047", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014047" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1249", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html", "refsource": "CONFIRM", "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "name": "13727", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13727" }, { "name": "20050524 Ipswitch IMail IMAP LSUB DoS Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=245\u0026type=vulnerabilities" }, { "name": "1014047", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014047" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1249", "datePublished": "2005-05-25T04:00:00", "dateReserved": "2005-04-25T00:00:00", "dateUpdated": "2024-08-07T21:44:05.434Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-3959 (GCVE-0-2007-3959)
Vulnerability from cvelistv5
Published
2007-07-24 18:00
Modified
2024-08-07 14:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The IM Server (aka IMserve or IMserver) 2.0.5.30 and probably earlier in Ipswitch Instant Messaging before 2.07 in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (daemon crash) via certain data to TCP port 5179 that overwrites a destructor, as reachable by the (1) DoAttachVideoSender, (2) DoAttachVideoReceiver, (3) DoAttachAudioSender, and (4) DoAttachAudioReceiver functions.
References
▼ | URL | Tags |
---|---|---|
http://www.ipswitch.com/support/instant_messaging/patch-upgrades.asp | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2007/2621 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/25031 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/26154 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1018440 | vdb-entry, x_refsource_SECTRACK | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=566 | third-party-advisory, x_refsource_IDEFENSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:37:05.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ipswitch.com/support/instant_messaging/patch-upgrades.asp" }, { "name": "ADV-2007-2621", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2621" }, { "name": "25031", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25031" }, { "name": "26154", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26154" }, { "name": "1018440", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018440" }, { "name": "20070723 Ipswitch Instant Messaging Server Denial of Service Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=566" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The IM Server (aka IMserve or IMserver) 2.0.5.30 and probably earlier in Ipswitch Instant Messaging before 2.07 in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (daemon crash) via certain data to TCP port 5179 that overwrites a destructor, as reachable by the (1) DoAttachVideoSender, (2) DoAttachVideoReceiver, (3) DoAttachAudioSender, and (4) DoAttachAudioReceiver functions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ipswitch.com/support/instant_messaging/patch-upgrades.asp" }, { "name": "ADV-2007-2621", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2621" }, { "name": "25031", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25031" }, { "name": "26154", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26154" }, { "name": "1018440", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018440" }, { "name": "20070723 Ipswitch Instant Messaging Server Denial of Service Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=566" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3959", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IM Server (aka IMserve or IMserver) 2.0.5.30 and probably earlier in Ipswitch Instant Messaging before 2.07 in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (daemon crash) via certain data to TCP port 5179 that overwrites a destructor, as reachable by the (1) DoAttachVideoSender, (2) DoAttachVideoReceiver, (3) DoAttachAudioSender, and (4) DoAttachAudioReceiver functions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ipswitch.com/support/instant_messaging/patch-upgrades.asp", "refsource": "CONFIRM", "url": "http://www.ipswitch.com/support/instant_messaging/patch-upgrades.asp" }, { "name": "ADV-2007-2621", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2621" }, { "name": "25031", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25031" }, { "name": "26154", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26154" }, { "name": "1018440", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018440" }, { "name": "20070723 Ipswitch Instant Messaging Server Denial of Service Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=566" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3959", "datePublished": "2007-07-24T18:00:00", "dateReserved": "2007-07-24T00:00:00", "dateUpdated": "2024-08-07T14:37:05.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-1255 (GCVE-0-2005-1255)
Vulnerability from cvelistv5
Published
2005-05-25 04:00
Modified
2024-08-07 21:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character.
References
▼ | URL | Tags |
---|---|---|
http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/13727 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1014047 | vdb-entry, x_refsource_SECTRACK | |
http://www.idefense.com/application/poi/display?id=243&type=vulnerabilities | third-party-advisory, x_refsource_IDEFENSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:44:06.254Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "name": "13727", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13727" }, { "name": "1014047", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014047" }, { "name": "20050524 Ipswitch IMail IMAP LOGIN Remote Buffer Overflow Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=243\u0026type=vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-05-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-06-04T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "name": "13727", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13727" }, { "name": "1014047", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014047" }, { "name": "20050524 Ipswitch IMail IMAP LOGIN Remote Buffer Overflow Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=243\u0026type=vulnerabilities" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1255", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html", "refsource": "CONFIRM", "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "name": "13727", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13727" }, { "name": "1014047", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014047" }, { "name": "20050524 Ipswitch IMail IMAP LOGIN Remote Buffer Overflow Vulnerabilities", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=243\u0026type=vulnerabilities" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1255", "datePublished": "2005-05-25T04:00:00", "dateReserved": "2005-04-25T00:00:00", "dateUpdated": "2024-08-07T21:44:06.254Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2931 (GCVE-0-2005-2931)
Vulnerability from cvelistv5
Published
2005-12-07 01:00
Modified
2024-08-07 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands.
References
▼ | URL | Tags |
---|---|---|
http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities | third-party-advisory, x_refsource_IDEFENSE | |
http://securitytracker.com/id?1015317 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/17863 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2005/2782 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/15752 | vdb-entry, x_refsource_BID | |
http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:53:29.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20051206 Ipswitch Collaboration Suite SMTP Format String Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=346\u0026type=vulnerabilities" }, { "name": "1015317", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015317" }, { "name": "17863", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17863" }, { "name": "ADV-2005-2782", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2782" }, { "name": "15752", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15752" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-12-09T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20051206 Ipswitch Collaboration Suite SMTP Format String Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=346\u0026type=vulnerabilities" }, { "name": "1015317", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015317" }, { "name": "17863", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17863" }, { "name": "ADV-2005-2782", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2782" }, { "name": "15752", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15752" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2931", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20051206 Ipswitch Collaboration Suite SMTP Format String Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=346\u0026type=vulnerabilities" }, { "name": "1015317", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015317" }, { "name": "17863", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17863" }, { "name": "ADV-2005-2782", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2782" }, { "name": "15752", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15752" }, { "name": "http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp", "refsource": "CONFIRM", "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2931", "datePublished": "2005-12-07T01:00:00", "dateReserved": "2005-09-15T00:00:00", "dateUpdated": "2024-08-07T22:53:29.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-1637 (GCVE-0-2007-1637)
Vulnerability from cvelistv5
Published
2007-03-23 22:00
Modified
2024-08-07 13:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/0853 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/24422 | third-party-advisory, x_refsource_SECUNIA | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=487 | third-party-advisory, x_refsource_IDEFENSE | |
http://www.securitytracker.com/id?1017737 | vdb-entry, x_refsource_SECTRACK | |
http://support.ipswitch.com/kb/IM-20070305-JH01.htm | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:06:25.360Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-0853", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0853" }, { "name": "24422", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24422" }, { "name": "20070307 Ipswitch IMail Server 2006 Multiple ActiveX Control Buffer Overflow Vulnerabilitie", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=487" }, { "name": "1017737", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017737" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ipswitch.com/kb/IM-20070305-JH01.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-0853", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0853" }, { "name": "24422", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24422" }, { "name": "20070307 Ipswitch IMail Server 2006 Multiple ActiveX Control Buffer Overflow Vulnerabilitie", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=487" }, { "name": "1017737", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017737" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ipswitch.com/kb/IM-20070305-JH01.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1637", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-0853", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0853" }, { "name": "24422", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24422" }, { "name": "20070307 Ipswitch IMail Server 2006 Multiple ActiveX Control Buffer Overflow Vulnerabilitie", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=487" }, { "name": "1017737", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017737" }, { "name": "http://support.ipswitch.com/kb/IM-20070305-JH01.htm", "refsource": "CONFIRM", "url": "http://support.ipswitch.com/kb/IM-20070305-JH01.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1637", "datePublished": "2007-03-23T22:00:00", "dateReserved": "2007-03-23T00:00:00", "dateUpdated": "2024-08-07T13:06:25.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2923 (GCVE-0-2005-2923)
Vulnerability from cvelistv5
Published
2005-12-07 01:00
Modified
2024-08-07 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/17863 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2005/2782 | vdb-entry, x_refsource_VUPEN | |
http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities | third-party-advisory, x_refsource_IDEFENSE | |
http://securitytracker.com/id?1015318 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/15753 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:53:29.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "17863", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17863" }, { "name": "ADV-2005-2782", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2782" }, { "name": "20051206 Ipswitch IMail IMAP List Command DoS Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=347\u0026type=vulnerabilities" }, { "name": "1015318", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015318" }, { "name": "15753", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15753" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-12-09T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "17863", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17863" }, { "name": "ADV-2005-2782", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2782" }, { "name": "20051206 Ipswitch IMail IMAP List Command DoS Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=347\u0026type=vulnerabilities" }, { "name": "1015318", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015318" }, { "name": "15753", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15753" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2923", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "17863", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17863" }, { "name": "ADV-2005-2782", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2782" }, { "name": "20051206 Ipswitch IMail IMAP List Command DoS Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=347\u0026type=vulnerabilities" }, { "name": "1015318", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015318" }, { "name": "15753", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15753" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2923", "datePublished": "2005-12-07T01:00:00", "dateReserved": "2005-09-15T00:00:00", "dateUpdated": "2024-08-07T22:53:29.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-1256 (GCVE-0-2005-1256)
Vulnerability from cvelistv5
Published
2005-05-25 04:00
Modified
2024-08-07 21:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
References
▼ | URL | Tags |
---|---|---|
http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/13727 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1014047 | vdb-entry, x_refsource_SECTRACK | |
http://www.idefense.com/application/poi/display?id=244&type=vulnerabilities | third-party-advisory, x_refsource_IDEFENSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:44:05.453Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "name": "13727", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13727" }, { "name": "1014047", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014047" }, { "name": "20050524 Ipswitch IMail IMAP STATUS Remote Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=244\u0026type=vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-05-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-06-04T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "name": "13727", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13727" }, { "name": "1014047", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014047" }, { "name": "20050524 Ipswitch IMail IMAP STATUS Remote Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=244\u0026type=vulnerabilities" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1256", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html", "refsource": "CONFIRM", "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "name": "13727", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13727" }, { "name": "1014047", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014047" }, { "name": "20050524 Ipswitch IMail IMAP STATUS Remote Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=244\u0026type=vulnerabilities" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1256", "datePublished": "2005-05-25T04:00:00", "dateReserved": "2005-04-25T00:00:00", "dateUpdated": "2024-08-07T21:44:05.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-4379 (GCVE-0-2006-4379)
Vulnerability from cvelistv5
Published
2006-09-08 21:00
Modified
2024-08-07 19:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/21795 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/445521/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securitytracker.com/id?1016804 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/19885 | vdb-entry, x_refsource_BID | |
http://www.ipswitch.com/support/imail/releases/im20061.asp | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28789 | vdb-entry, x_refsource_XF | |
http://www.ipswitch.com/support/ics/updates/ics20061.asp | x_refsource_CONFIRM | |
http://www.zerodayinitiative.com/advisories/ZDI-06-028.html | x_refsource_MISC | |
http://securitytracker.com/id?1016803 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2006/3496 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:06:07.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "21795", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21795" }, { "name": "20060907 ZDI-06-028: Ipswitch Collaboration Suite SMTP Server Stack Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/445521/100/0/threaded" }, { "name": "1016804", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016804" }, { "name": "19885", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19885" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ipswitch.com/support/imail/releases/im20061.asp" }, { "name": "ipswitch-smtp-daemon-code-execution(28789)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28789" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ipswitch.com/support/ics/updates/ics20061.asp" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-028.html" }, { "name": "1016803", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016803" }, { "name": "ADV-2006-3496", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3496" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an \u0027@\u0027 character and before a \u0027:\u0027 character." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "21795", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21795" }, { "name": "20060907 ZDI-06-028: Ipswitch Collaboration Suite SMTP Server Stack Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/445521/100/0/threaded" }, { "name": "1016804", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016804" }, { "name": "19885", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19885" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ipswitch.com/support/imail/releases/im20061.asp" }, { "name": "ipswitch-smtp-daemon-code-execution(28789)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28789" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ipswitch.com/support/ics/updates/ics20061.asp" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-028.html" }, { "name": "1016803", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016803" }, { "name": "ADV-2006-3496", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3496" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4379", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an \u0027@\u0027 character and before a \u0027:\u0027 character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "21795", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21795" }, { "name": "20060907 ZDI-06-028: Ipswitch Collaboration Suite SMTP Server Stack Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/445521/100/0/threaded" }, { "name": "1016804", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016804" }, { "name": "19885", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19885" }, { "name": "http://www.ipswitch.com/support/imail/releases/im20061.asp", "refsource": "CONFIRM", "url": "http://www.ipswitch.com/support/imail/releases/im20061.asp" }, { "name": "ipswitch-smtp-daemon-code-execution(28789)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28789" }, { "name": "http://www.ipswitch.com/support/ics/updates/ics20061.asp", "refsource": "CONFIRM", "url": "http://www.ipswitch.com/support/ics/updates/ics20061.asp" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-06-028.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-028.html" }, { "name": "1016803", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016803" }, { "name": "ADV-2006-3496", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3496" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4379", "datePublished": "2006-09-08T21:00:00", "dateReserved": "2006-08-28T00:00:00", "dateUpdated": "2024-08-07T19:06:07.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3526 (GCVE-0-2005-3526)
Vulnerability from cvelistv5
Published
2006-03-13 19:00
Modified
2024-08-07 23:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/427536/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/17063 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/19168 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2006/0907 | vdb-entry, x_refsource_VUPEN | |
http://securityreason.com/securityalert/577 | third-party-advisory, x_refsource_SREASON | |
http://www.ipswitch.com/support/ics/updates/ics200603prem.asp | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25133 | vdb-entry, x_refsource_XF | |
http://www.zerodayinitiative.com/advisories/ZDI-06-003.html | x_refsource_MISC | |
http://securitytracker.com/id?1015759 | vdb-entry, x_refsource_SECTRACK | |
http://www.osvdb.org/23796 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:17:23.231Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20060313 ZDI-06-003: Ipswitch Collaboration Suite Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/427536/100/0/threaded" }, { "name": "17063", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17063" }, { "name": "19168", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19168" }, { "name": "ADV-2006-0907", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0907" }, { "name": "577", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/577" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ipswitch.com/support/ics/updates/ics200603prem.asp" }, { "name": "ipswitch-imap-fetch-bo(25133)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25133" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-003.html" }, { "name": "1015759", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015759" }, { "name": "23796", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/23796" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-03-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20060313 ZDI-06-003: Ipswitch Collaboration Suite Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/427536/100/0/threaded" }, { "name": "17063", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17063" }, { "name": "19168", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19168" }, { "name": "ADV-2006-0907", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0907" }, { "name": "577", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/577" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ipswitch.com/support/ics/updates/ics200603prem.asp" }, { "name": "ipswitch-imap-fetch-bo(25133)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25133" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-003.html" }, { "name": "1015759", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015759" }, { "name": "23796", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/23796" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3526", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060313 ZDI-06-003: Ipswitch Collaboration Suite Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/427536/100/0/threaded" }, { "name": "17063", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17063" }, { "name": "19168", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19168" }, { "name": "ADV-2006-0907", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0907" }, { "name": "577", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/577" }, { "name": "http://www.ipswitch.com/support/ics/updates/ics200603prem.asp", "refsource": "CONFIRM", "url": "http://www.ipswitch.com/support/ics/updates/ics200603prem.asp" }, { "name": "ipswitch-imap-fetch-bo(25133)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25133" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-06-003.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-003.html" }, { "name": "1015759", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015759" }, { "name": "23796", "refsource": "OSVDB", "url": "http://www.osvdb.org/23796" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3526", "datePublished": "2006-03-13T19:00:00", "dateReserved": "2005-11-08T00:00:00", "dateUpdated": "2024-08-07T23:17:23.231Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-3927 (GCVE-0-2007-3927)
Vulnerability from cvelistv5
Published
2007-07-21 00:00
Modified
2024-08-07 14:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to "subscribe."
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/2574 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/24962 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35505 | vdb-entry, x_refsource_XF | |
http://osvdb.org/45819 | vdb-entry, x_refsource_OSVDB | |
http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease | x_refsource_CONFIRM | |
http://osvdb.org/45818 | vdb-entry, x_refsource_OSVDB | |
http://www.securitytracker.com/id?1018421 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35504 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/26123 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:37:05.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-2574", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2574" }, { "name": "24962", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24962" }, { "name": "ipswitch-imail-subscribe-bo(35505)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35505" }, { "name": "45819", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/45819" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease" }, { "name": "45818", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/45818" }, { "name": "1018421", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018421" }, { "name": "ipswitch-imail-imailsec-bo(35504)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35504" }, { "name": "26123", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to \"subscribe.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-2574", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2574" }, { "name": "24962", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24962" }, { "name": "ipswitch-imail-subscribe-bo(35505)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35505" }, { "name": "45819", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/45819" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease" }, { "name": "45818", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/45818" }, { "name": "1018421", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018421" }, { "name": "ipswitch-imail-imailsec-bo(35504)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35504" }, { "name": "26123", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3927", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to \"subscribe.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-2574", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2574" }, { "name": "24962", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24962" }, { "name": "ipswitch-imail-subscribe-bo(35505)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35505" }, { "name": "45819", "refsource": "OSVDB", "url": "http://osvdb.org/45819" }, { "name": "http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease", "refsource": "CONFIRM", "url": "http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease" }, { "name": "45818", "refsource": "OSVDB", "url": "http://osvdb.org/45818" }, { "name": "1018421", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018421" }, { "name": "ipswitch-imail-imailsec-bo(35504)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35504" }, { "name": "26123", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26123" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3927", "datePublished": "2007-07-21T00:00:00", "dateReserved": "2007-07-20T00:00:00", "dateUpdated": "2024-08-07T14:37:05.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-0707 (GCVE-0-2005-0707)
Vulnerability from cvelistv5
Published
2005-03-10 05:00
Modified
2024-08-07 21:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) before 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/19655 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/12780 | vdb-entry, x_refsource_BID | |
http://www.idefense.com/application/poi/display?id=216&type=vulnerabilities | third-party-advisory, x_refsource_IDEFENSE | |
http://securitytracker.com/id?1013410 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/14546 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:21:06.506Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ipswitch-imail-imapexamine-bo(19655)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19655" }, { "name": "12780", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12780" }, { "name": "20050310 Ipswitch Collaboration Suite IMAP EXAMINE Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=216\u0026type=vulnerabilities" }, { "name": "1013410", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013410" }, { "name": "14546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14546" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-03-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) before 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ipswitch-imail-imapexamine-bo(19655)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19655" }, { "name": "12780", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12780" }, { "name": "20050310 Ipswitch Collaboration Suite IMAP EXAMINE Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=216\u0026type=vulnerabilities" }, { "name": "1013410", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013410" }, { "name": "14546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14546" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0707", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) before 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ipswitch-imail-imapexamine-bo(19655)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19655" }, { "name": "12780", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12780" }, { "name": "20050310 Ipswitch Collaboration Suite IMAP EXAMINE Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=216\u0026type=vulnerabilities" }, { "name": "1013410", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013410" }, { "name": "14546", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14546" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0707", "datePublished": "2005-03-10T05:00:00", "dateReserved": "2005-03-10T00:00:00", "dateUpdated": "2024-08-07T21:21:06.506Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3552 (GCVE-0-2006-3552)
Vulnerability from cvelistv5
Published
2006-07-13 00:00
Modified
2024-08-07 18:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Premium Anti-Spam in Ipswitch IMail Secure Server 2006 and Collaboration Suite 2006 Premium, when using a certain .dat file in the StarEngine /data directory from 20060630 or earlier, does not properly receive and implement bullet signature updates, which allows context-dependent attackers to use the server for spam transmission.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1016420 | vdb-entry, x_refsource_SECTRACK | |
http://ipswitch.com/support/imail/releases/security_advisory_20060630.asp | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2006/2653 | vdb-entry, x_refsource_VUPEN | |
http://securitytracker.com/id?1016419 | vdb-entry, x_refsource_SECTRACK | |
http://ipswitch.com/support/ics/updates/security_advisory_20060630.asp | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:34.457Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1016420", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ipswitch.com/support/imail/releases/security_advisory_20060630.asp" }, { "name": "ADV-2006-2653", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2653" }, { "name": "1016419", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016419" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ipswitch.com/support/ics/updates/security_advisory_20060630.asp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-06-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Premium Anti-Spam in Ipswitch IMail Secure Server 2006 and Collaboration Suite 2006 Premium, when using a certain .dat file in the StarEngine /data directory from 20060630 or earlier, does not properly receive and implement bullet signature updates, which allows context-dependent attackers to use the server for spam transmission." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1016420", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ipswitch.com/support/imail/releases/security_advisory_20060630.asp" }, { "name": "ADV-2006-2653", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2653" }, { "name": "1016419", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016419" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ipswitch.com/support/ics/updates/security_advisory_20060630.asp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3552", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Premium Anti-Spam in Ipswitch IMail Secure Server 2006 and Collaboration Suite 2006 Premium, when using a certain .dat file in the StarEngine /data directory from 20060630 or earlier, does not properly receive and implement bullet signature updates, which allows context-dependent attackers to use the server for spam transmission." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1016420", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016420" }, { "name": "http://ipswitch.com/support/imail/releases/security_advisory_20060630.asp", "refsource": "CONFIRM", "url": "http://ipswitch.com/support/imail/releases/security_advisory_20060630.asp" }, { "name": "ADV-2006-2653", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2653" }, { "name": "1016419", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016419" }, { "name": "http://ipswitch.com/support/ics/updates/security_advisory_20060630.asp", "refsource": "CONFIRM", "url": "http://ipswitch.com/support/ics/updates/security_advisory_20060630.asp" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3552", "datePublished": "2006-07-13T00:00:00", "dateReserved": "2006-07-12T00:00:00", "dateUpdated": "2024-08-07T18:30:34.457Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-3925 (GCVE-0-2007-3925)
Vulnerability from cvelistv5
Published
2007-07-21 00:00
Modified
2024-08-07 14:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/2574 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/24962 | vdb-entry, x_refsource_BID | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563 | third-party-advisory, x_refsource_IDEFENSE | |
http://www.securitytracker.com/id?1018419 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35496 | vdb-entry, x_refsource_XF | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35500 | vdb-entry, x_refsource_XF | |
http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease | x_refsource_CONFIRM | |
http://secunia.com/advisories/26123 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:37:05.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-2574", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2574" }, { "name": "24962", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24962" }, { "name": "20070718 Ipswitch IMail Server 2006 IMAP Search Command Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563" }, { "name": "1018419", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018419" }, { "name": "ipswitch-imail-search-bo(35496)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35496" }, { "name": "ipswitch-imail-searchcharset-bo(35500)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35500" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease" }, { "name": "26123", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-2574", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2574" }, { "name": "24962", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24962" }, { "name": "20070718 Ipswitch IMail Server 2006 IMAP Search Command Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563" }, { "name": "1018419", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018419" }, { "name": "ipswitch-imail-search-bo(35496)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35496" }, { "name": "ipswitch-imail-searchcharset-bo(35500)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35500" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease" }, { "name": "26123", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3925", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-2574", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2574" }, { "name": "24962", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24962" }, { "name": "20070718 Ipswitch IMail Server 2006 IMAP Search Command Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563" }, { "name": "1018419", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018419" }, { "name": "ipswitch-imail-search-bo(35496)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35496" }, { "name": "ipswitch-imail-searchcharset-bo(35500)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35500" }, { "name": "http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease", "refsource": "CONFIRM", "url": "http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease" }, { "name": "26123", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26123" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3925", "datePublished": "2007-07-21T00:00:00", "dateReserved": "2007-07-20T00:00:00", "dateUpdated": "2024-08-07T14:37:05.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }