Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Ipswitch_collaboration_suite
(Ipswitch)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 13 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2005-05-25 | CVE-2005-1255 | Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character. | Imail, Imail_server, Ipswitch_collaboration_suite | N/A | ||
2005-05-25 | CVE-2005-1249 | The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop. | Ipswitch_collaboration_suite | N/A | ||
2005-05-02 | CVE-2005-0707 | Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) before 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command. | Ipswitch_collaboration_suite | N/A |