ipswitch CVE Vulnerabilities & Metrics

Focus on ipswitch vulnerabilities and metrics.

Last updated: 16 Apr 2025, 22:25 UTC

About ipswitch Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with ipswitch. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total ipswitch CVEs: 14
Earliest CVE date: 02 Jan 1999, 05:00 UTC
Latest CVE date: 31 Oct 2019, 17:15 UTC

Latest CVE reference: CVE-2019-18465

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical ipswitch CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 6.21

Max CVSS: 10.0

Critical CVEs (≥9): 10

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 62
7.0-8.9 31
9.0-10.0 10

CVSS Distribution Chart

Top 5 Highest CVSS ipswitch CVEs

These are the five CVEs with the highest CVSS scores for ipswitch, sorted by severity first and recency.

All CVEs for ipswitch

CVE-2019-18465 ipswitch vulnerability CVSS: 6.8 31 Oct 2019, 17:15 UTC

In Progress MOVEit Transfer 11.1 before 11.1.3, a vulnerability has been found that could allow an attacker to sign in without full credentials via the SSH (SFTP) interface. The vulnerability affects only certain SSH (SFTP) configurations, and is applicable only if the MySQL database is being used.

CVE-2019-18464 ipswitch vulnerability CVSS: 7.5 31 Oct 2019, 17:15 UTC

In Progress MOVEit Transfer 10.2 before 10.2.6 (2018.3), 11.0 before 11.0.4 (2019.0.4), and 11.1 before 11.1.3 (2019.1.3), multiple SQL Injection vulnerabilities have been found in the REST API that could allow an unauthenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database or may be able to alter the database.

CVE-2019-16383 ipswitch vulnerability CVSS: 7.5 24 Sep 2019, 15:15 UTC

MOVEit.DMZ.WebApi.dll in Progress MOVEit Transfer 2018 SP2 before 10.2.4, 2019 before 11.0.2, and 2019.1 before 11.1.1 allows an unauthenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, or may be able to alter the database via the REST API, aka SQL Injection.

CVE-2018-6545 ipswitch vulnerability CVSS: 4.3 02 Feb 2018, 09:29 UTC

Ipswitch MoveIt v8.1 is vulnerable to a Stored Cross-Site Scripting (XSS) vulnerability, as demonstrated by human.aspx. Attackers can leverage this vulnerability to send malicious messages to other users in order to steal session cookies and launch client-side attacks.

CVE-2017-16513 ipswitch vulnerability CVSS: 4.6 03 Nov 2017, 15:29 UTC

Ipswitch WS_FTP Professional before 12.6.0.3 has buffer overflows in the local search field and the backup locations field, aka WSCLT-1729.

CVE-2017-12639 ipswitch vulnerability CVSS: 7.5 03 Oct 2017, 01:29 UTC

Stack based buffer overflow in Ipswitch IMail server up to and including 12.5.5 allows remote attackers to execute arbitrary code via unspecified vectors in IMmailSrv, aka ETRE or ETCTERARED.

CVE-2017-12638 ipswitch vulnerability CVSS: 7.5 03 Oct 2017, 01:29 UTC

Stack based buffer overflow in Ipswitch IMail server up to and including 12.5.5 allows remote attackers to execute arbitrary code via unspecified vectors in IMmailSrv, aka ETBL or ETCETERABLUE.

CVE-2017-6195 ipswitch vulnerability CVSS: 7.5 18 May 2017, 06:29 UTC

Ipswitch MOVEit Transfer (formerly DMZ) allows pre-authentication blind SQL injection. The fixed versions are MOVEit Transfer 2017 9.0.0.201, MOVEit DMZ 8.3.0.30, and MOVEit DMZ 8.2.0.20.

CVE-2015-7676 ipswitch vulnerability CVSS: 3.5 15 Apr 2016, 15:59 UTC

Ipswitch MOVEit File Transfer (formerly DMZ) 8.1 and earlier, when configured to support file view on download, allows remote authenticated users to conduct cross-site scripting (XSS) attacks by uploading HTML files.

CVE-2015-7680 ipswitch vulnerability CVSS: 5.0 10 Feb 2016, 15:59 UTC

Ipswitch MOVEit DMZ before 8.2 provides different error messages for authentication attempts depending on whether the user account exists, which allows remote attackers to enumerate usernames via a series of SOAP requests to machine.aspx.

CVE-2015-7679 ipswitch vulnerability CVSS: 4.3 10 Feb 2016, 15:59 UTC

Cross-site scripting (XSS) vulnerability in Ipswitch MOVEit Mobile before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via the query string to mobile/.

CVE-2015-7678 ipswitch vulnerability CVSS: 6.8 10 Feb 2016, 15:59 UTC

Multiple cross-site request forgery (CSRF) vulnerabilities in Ipswitch MOVEit Mobile 1.2.0.962 and earlier allow remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2015-7677 ipswitch vulnerability CVSS: 4.0 10 Feb 2016, 15:59 UTC

The MOVEitISAPI service in Ipswitch MOVEit DMZ before 8.2 provides different error messages depending on whether a FileID exists, which allows remote authenticated users to enumerate FileIDs via the X-siLock-FileID parameter in a download action to MOVEitISAPI/MOVEitISAPI.dll.

CVE-2015-7675 ipswitch vulnerability CVSS: 4.0 10 Feb 2016, 15:59 UTC

The "Send as attachment" feature in Ipswitch MOVEit DMZ before 8.2 and MOVEit Mobile before 1.2.2 allow remote authenticated users to bypass authorization and read uploaded files via a valid FileID in the (1) serverFileIds parameter to mobile/sendMsg or (2) arg01 parameter to human.aspx.

CVE-2011-4722 ipswitch vulnerability CVSS: 7.8 28 Dec 2014, 02:59 UTC

Directory traversal vulnerability in the TFTP Server 1.0.0.24 in Ipswitch WhatsUp Gold allows remote attackers to read arbitrary files via a .. (dot dot) in the Filename field of an RRQ operation.

CVE-2014-3878 ipswitch vulnerability CVSS: 4.3 05 Jun 2014, 17:55 UTC

Multiple cross-site scripting (XSS) vulnerabilities in the web client interface in Ipswitch IMail Server 12.3 and 12.4, possibly before 12.4.1.15, allow remote attackers to inject arbitrary web script or HTML via (1) the Name field in an add new contact action in the Contacts section or unspecified vectors in (2) an Add Group task in the Contacts section, (3) an add new event action in the Calendar section, or (4) the Task section.

CVE-2011-1430 ipswitch vulnerability CVSS: 6.8 16 Mar 2011, 22:55 UTC

The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.

CVE-2009-4775 ipswitch vulnerability CVSS: 4.3 21 Apr 2010, 14:30 UTC

Format string vulnerability in Ipswitch WS_FTP Professional 12 before 12.2 allows remote attackers to cause a denial of service (crash) via format string specifiers in the status code portion of an HTTP response.

CVE-2007-2795 ipswitch vulnerability CVSS: 9.0 27 Jan 2009, 23:30 UTC

Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon.

CVE-2008-5693 ipswitch vulnerability CVSS: 5.0 19 Dec 2008, 18:30 UTC

Ipswitch WS_FTP Server Manager 6.1.0.0 and earlier, and possibly other Ipswitch products, might allow remote attackers to read the contents of custom ASP files in WSFTPSVR/ via a request with an appended dot character.

CVE-2008-5692 ipswitch vulnerability CVSS: 5.0 19 Dec 2008, 18:30 UTC

Ipswitch WS_FTP Server Manager before 6.1.1, and possibly other Ipswitch products, allows remote attackers to bypass authentication and read logs via a logLogout action to FTPLogServer/login.asp followed by a request to FTPLogServer/LogViewer.asp with the localhostnull account name.

CVE-2008-3795 ipswitch vulnerability CVSS: 10.0 27 Aug 2008, 15:21 UTC

Buffer overflow in Ipswitch WS_FTP Home client allows remote FTP servers to have an unknown impact via a long "message response."

CVE-2008-3734 ipswitch vulnerability CVSS: 9.3 20 Aug 2008, 16:41 UTC

Format string vulnerability in Ipswitch WS_FTP Home 2007.0.0.2 and WS_FTP Professional 2007.1.0.0 allows remote FTP servers to cause a denial of service (application crash) or possibly execute arbitrary code via format string specifiers in a connection greeting (response).

CVE-2008-0944 ipswitch vulnerability CVSS: 5.0 25 Feb 2008, 21:44 UTC

Ipswitch Instant Messaging (IM) 2.0.8.1 and earlier allows remote attackers to cause a denial of service (NULL dereference and application crash) via a version field containing zero.

CVE-2008-0946 ipswitch vulnerability CVSS: 4.9 25 Feb 2008, 21:44 UTC

Directory traversal vulnerability in the IM Server (aka IMserve or IMserver) in Ipswitch Instant Messaging (IM) 2.0.8.1 and earlier allows remote authenticated users to create arbitrary empty files via a .. (dot dot) in the recipient field.

CVE-2008-0945 ipswitch vulnerability CVSS: 3.5 25 Feb 2008, 21:44 UTC

Format string vulnerability in the logging function in the IM Server (aka IMserve or IMserver) in Ipswitch Instant Messaging (IM) 2.0.8.1 and earlier allows remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in an IP address field.

CVE-2008-0608 ipswitch vulnerability CVSS: 5.0 06 Feb 2008, 12:00 UTC

The Logging Server (ftplogsrv.exe) 7.9.14.0 and earlier in IPSwitch WS_FTP 6.1 allows remote attackers to cause a denial of service (loss of responsiveness) via a large number of large packets to port 5151/udp, which causes the listening socket to terminate and prevents log commands from being recorded, a different vulnerability than CVE-2007-3823.

CVE-2007-4345 ipswitch vulnerability CVSS: 7.5 31 Oct 2007, 17:46 UTC

Buffer overflow in IMail Client 9.22, as shipped with IPSwitch IMail Server 2006.22, allows remote attackers to execute arbitrary code via a long boundary parameter in a multipart MIME e-mail message.

CVE-2007-5094 ipswitch vulnerability CVSS: 7.5 26 Sep 2007, 22:17 UTC

Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 through 8.11 allows remote attackers to execute arbitrary code via a set of four different e-mail messages with a long boundary parameter in a certain malformed Content-Type header line, the string "MIME" by itself on a line in the header, and a long Content-Transfer-Encoding header line.

CVE-2007-4555 ipswitch vulnerability CVSS: 4.3 28 Aug 2007, 00:17 UTC

Cross-site scripting (XSS) vulnerability in Ipswitch WS_FTP allows remote attackers to inject arbitrary web script or HTML via arguments to a valid command, which is not properly handled when it is displayed by the view log option in the administration interface. NOTE: this can be leveraged to create a new admin account.

CVE-2007-3959 ipswitch vulnerability CVSS: 5.0 24 Jul 2007, 18:30 UTC

The IM Server (aka IMserve or IMserver) 2.0.5.30 and probably earlier in Ipswitch Instant Messaging before 2.07 in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (daemon crash) via certain data to TCP port 5179 that overwrites a destructor, as reachable by the (1) DoAttachVideoSender, (2) DoAttachVideoReceiver, (3) DoAttachAudioSender, and (4) DoAttachAudioReceiver functions.

CVE-2007-3927 ipswitch vulnerability CVSS: 10.0 21 Jul 2007, 00:30 UTC

Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to "subscribe."

CVE-2007-3926 ipswitch vulnerability CVSS: 7.8 21 Jul 2007, 00:30 UTC

Ipswitch IMail Server 2006 before 2006.21 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving an "overwritten destructor."

CVE-2007-3925 ipswitch vulnerability CVSS: 6.5 21 Jul 2007, 00:30 UTC

Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.

CVE-2007-3823 ipswitch vulnerability CVSS: 7.8 17 Jul 2007, 01:30 UTC

The Logging Server (Logsrv.exe) in IPSwitch WS_FTP 7.5.29.0 allows remote attackers to cause a denial of service (daemon crash) by sending a crafted packet containing a long string to port 5151/udp.

CVE-2007-2213 ipswitch vulnerability CVSS: 7.8 24 Apr 2007, 20:19 UTC

Unspecified vulnerability in the Initialize function in NetscapeFTPHandler in WS_FTP Home and Professional 2007 allows remote attackers to cause a denial of service (NULL dereference and application crash) via unspecified vectors related to "improper arguments."

CVE-2007-1637 ipswitch vulnerability CVSS: 9.3 23 Mar 2007, 22:19 UTC

Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control.

CVE-2007-0665 ipswitch vulnerability CVSS: 6.8 02 Feb 2007, 21:28 UTC

Format string vulnerability in the SCP module in Ipswitch WS_FTP 2007 Professional might allow remote attackers to execute arbitrary commands via format string specifiers in the filename, related to the SHELL WS_FTP script command.

CVE-2007-0666 ipswitch vulnerability CVSS: 6.8 02 Feb 2007, 21:28 UTC

Ipswitch WS_FTP Server 5.04 allows FTP site administrators to execute arbitrary code on the system via a long input string to the (1) iFTPAddU or (2) iFTPAddH file, or to a (3) edition module.

CVE-2007-0330 ipswitch vulnerability CVSS: 7.5 18 Jan 2007, 02:28 UTC

Buffer overflow in wsbho2k0.dll, as used by wsftpurl.exe, in Ipswitch WS_FTP 2007 Professional allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long ftp:// URL in an HTML document, and possibly other vectors.

CVE-2006-5000 ipswitch vulnerability CVSS: 6.5 26 Sep 2006, 20:07 UTC

Multiple buffer overflows in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, have unknown impact and remote authenticated attack vectors via the (1) XCRC, (2) XMD5, and (3) XSHA1 commands. NOTE: in the early publication of this identifier on 20060926, the description was used for the wrong issue.

CVE-2006-5001 ipswitch vulnerability CVSS: 5.0 26 Sep 2006, 20:07 UTC

Unspecified vulnerability in the log analyzer in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, prevents certain sensitive information from being displayed in the (1) Files and (2) Summary tabs. NOTE: in the early publication of this identifier on 20060926, the description was used for the wrong issue.

CVE-2006-4974 ipswitch vulnerability CVSS: 7.5 25 Sep 2006, 01:07 UTC

Buffer overflow in Ipswitch WS_FTP Limited Edition (LE) 5.08 allows remote FTP servers to execute arbitrary code via a long response to a PASV command.

CVE-2006-4847 ipswitch vulnerability CVSS: 6.5 19 Sep 2006, 01:07 UTC

Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands.

CVE-2006-4379 ipswitch vulnerability CVSS: 7.5 08 Sep 2006, 21:04 UTC

Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character.

CVE-2006-3552 ipswitch vulnerability CVSS: 6.4 13 Jul 2006, 00:05 UTC

Premium Anti-Spam in Ipswitch IMail Secure Server 2006 and Collaboration Suite 2006 Premium, when using a certain .dat file in the StarEngine /data directory from 20060630 or earlier, does not properly receive and implement bullet signature updates, which allows context-dependent attackers to use the server for spam transmission.

CVE-2006-2531 ipswitch vulnerability CVSS: 7.5 22 May 2006, 23:10 UTC

Ipswitch WhatsUp Professional 2006 only verifies the user's identity via HTTP headers, which allows remote attackers to spoof being a trusted console and bypass authentication by setting HTTP User-Agent header to "Ipswitch/1.0" and the User-Application header to "NmConsole".

CVE-2006-2353 ipswitch vulnerability CVSS: 5.0 15 May 2006, 10:02 UTC

NmConsole/DeviceSelection.asp in Ipswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allows remote attackers to redirect users to other websites via the (1) sCancelURL and possibly (2) sRedirectUrl parameters.

CVE-2006-2354 ipswitch vulnerability CVSS: 5.0 15 May 2006, 10:02 UTC

NmConsole/Login.asp in Ipswitch WhatsUp Professional 2006 and Ipswitch WhatsUp Professional 2006 Premium generates different error messages in a way that allows remote attackers to enumerate valid usernames. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

CVE-2006-2355 ipswitch vulnerability CVSS: 5.0 15 May 2006, 10:02 UTC

Ipswitch WhatsUp Professional 2006 and Ipswitch WhatsUp Professional 2006 Premium allows remote attackers to obtain full path information via 404 error messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

CVE-2006-2356 ipswitch vulnerability CVSS: 5.0 15 May 2006, 10:02 UTC

NmConsole/utility/RenderMap.asp in Ipswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allows remote attackers to obtain sensitive information about network nodes via a modified nDeviceGroupID parameter.

CVE-2006-2357 ipswitch vulnerability CVSS: 5.0 15 May 2006, 10:02 UTC

Ipswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allows remote attackers to obtain source code for scripts via a trailing dot in a request to NmConsole/Login.asp.

CVE-2006-2351 ipswitch vulnerability CVSS: 4.3 15 May 2006, 10:02 UTC

Multiple cross-site scripting (XSS) vulnerabilities in IPswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allow remote attackers to inject arbitrary web script or HTML via the (1) sDeviceView or (2) nDeviceID parameter to (a) NmConsole/Navigation.asp or (3) sHostname parameter to (b) NmConsole/ToolResults.asp.

CVE-2006-2352 ipswitch vulnerability CVSS: 4.3 15 May 2006, 10:02 UTC

Multiple cross-site scripting (XSS) vulnerabilities in IPswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allow remote attackers to inject arbitrary web script or HTML via unknown vectors in (1) NmConsole/Tools.asp and (2) NmConsole/DeviceSelection.asp. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

CVE-2006-0911 ipswitch vulnerability CVSS: 5.0 28 Feb 2006, 11:02 UTC

NmService.exe in Ipswitch WhatsUp Professional 2006 allows remote attackers to cause a denial of service (CPU consumption) via crafted requests to Login.asp, possibly involving the (1) "In]" and (2) "b;tnLogIn" parameters, or (3) malformed btnLogIn parameters, possibly involving missing "[" (open bracket) or "[" (closing bracket) characters, as demonstrated by "&btnLogIn=[Log&In]=&" or "&b;tnLogIn=[Log&In]=&" in the URL. NOTE: due to the lack of diagnosis by the original researcher, the precise nature of the vulnerability is unclear.

CVE-2005-3526 ipswitch vulnerability CVSS: 6.5 31 Dec 2005, 05:00 UTC

Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command.

CVE-2005-1939 ipswitch vulnerability CVSS: 5.0 31 Dec 2005, 05:00 UTC

Directory traversal vulnerability in Ipswitch WhatsUp Small Business 2004 allows remote attackers to read arbitrary files via ".." (dot dot) sequences in a request to the Report service (TCP 8022).

CVE-2005-2931 ipswitch vulnerability CVSS: 7.5 07 Dec 2005, 01:03 UTC

Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands.

CVE-2005-2923 ipswitch vulnerability CVSS: 4.0 07 Dec 2005, 01:03 UTC

The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory.

CVE-2005-2160 ipswitch vulnerability CVSS: 5.0 06 Jul 2005, 04:00 UTC

IMail stores usernames and passwords in cleartext in a cookie, which allows remote attackers to obtain sensitive information.

CVE-2005-1250 ipswitch vulnerability CVSS: 7.5 22 Jun 2005, 04:00 UTC

SQL injection vulnerability in the logon screen of the web front end (NmConsole/Login.asp) for IpSwitch WhatsUp Professional 2005 SP1 allows remote attackers to execute arbitrary SQL commands via the (1) User Name field (sUserName parameter) or (2) Password (sPassword parameter).

CVE-2005-1255 ipswitch vulnerability CVSS: 10.0 25 May 2005, 04:00 UTC

Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character.

CVE-2005-1256 ipswitch vulnerability CVSS: 10.0 25 May 2005, 04:00 UTC

Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.

CVE-2005-1249 ipswitch vulnerability CVSS: 5.0 25 May 2005, 04:00 UTC

The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.

CVE-2005-1252 ipswitch vulnerability CVSS: 5.0 25 May 2005, 04:00 UTC

Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file.

CVE-2005-1254 ipswitch vulnerability CVSS: 5.0 25 May 2005, 04:00 UTC

Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument.

CVE-2005-0707 ipswitch vulnerability CVSS: 7.2 02 May 2005, 04:00 UTC

Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) before 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command.

CVE-1999-1557 ipswitch vulnerability CVSS: 5.0 02 May 2005, 04:00 UTC

Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.

CVE-2004-1135 ipswitch vulnerability CVSS: 5.0 10 Jan 2005, 05:00 UTC

Multiple buffer overflows in WS_FTP Server 5.03 2004.10.14 allow remote attackers to cause a denial of service (service crash) via long (1) SITE, (2) XMKD, (3) MKD, and (4) RNFR commands.

CVE-2004-2401 ipswitch vulnerability CVSS: 7.5 31 Dec 2004, 05:00 UTC

Stack-based buffer overflow in Ipswitch IMail Express Web Messaging before 8.05 might allow remote attackers to execute arbitrary code via an HTML message with long "tag text."

CVE-2004-1848 ipswitch vulnerability CVSS: 5.0 31 Dec 2004, 05:00 UTC

Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file.

CVE-2004-2422 ipswitch vulnerability CVSS: 5.0 31 Dec 2004, 05:00 UTC

Multiple features in Ipswitch IMail Server before 8.13 allow remote attackers to cause a denial of service (crash) via (1) a long sender field to the Queue Manager or (2) a long To field to the Web Messaging component.

CVE-2004-2423 ipswitch vulnerability CVSS: 5.0 31 Dec 2004, 05:00 UTC

Unknown vulnerability in the Web calendaring component of Ipswitch IMail Server before 8.13 allows remote attackers to cause a denial of service (crash) via "specific content."

CVE-2004-1520 ipswitch vulnerability CVSS: 4.6 31 Dec 2004, 05:00 UTC

Stack-based buffer overflow in IPSwitch IMail 8.13 allows remote authenticated users to execute arbitrary code via a long IMAP DELETE command.

CVE-2004-0297 ipswitch vulnerability CVSS: 10.0 23 Nov 2004, 05:00 UTC

Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) in Ipswitch IMail Server 8.03 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via an LDAP message with a large tag length.

CVE-2004-0799 ipswitch vulnerability CVSS: 5.0 20 Oct 2004, 04:00 UTC

The HTTP daemon in Ipswitch WhatsUp Gold 8.03 and 8.03 Hotfix 1 allows remote attackers to cause a denial of service (server crash) via a GET request containing an MS-DOS device name, as demonstrated using "prn.htm".

CVE-2004-1884 ipswitch vulnerability CVSS: 7.5 23 Mar 2004, 05:00 UTC

Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access.

CVE-2003-0772 ipswitch vulnerability CVSS: 7.5 22 Sep 2003, 04:00 UTC

Multiple buffer overflows in WS_FTP 3 and 4 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via long (1) APPE (append) or (2) STAT (status) arguments.

CVE-2002-1851 ipswitch vulnerability CVSS: 7.5 31 Dec 2002, 05:00 UTC

Buffer overflow in WS_FTP Pro 7.5 allows remote attackers to execute code on a client system via unknown attack vectors.

CVE-2002-1076 ipswitch vulnerability CVSS: 7.5 04 Oct 2002, 04:00 UTC

Buffer overflow in the Web Messaging daemon for Ipswitch IMail before 7.12 allows remote attackers to execute arbitrary code via a long HTTP GET request for HTTP/1.0.

CVE-2002-1077 ipswitch vulnerability CVSS: 5.0 04 Oct 2002, 04:00 UTC

IPSwitch IMail Web Calendaring service (iwebcal) allows remote attackers to cause a denial of service (crash) via an HTTP POST request without a Content-Length field.

CVE-2002-0777 ipswitch vulnerability CVSS: 10.0 12 Aug 2002, 04:00 UTC

Buffer overflow in the LDAP component of Ipswitch IMail 7.1 and earlier allows remote attackers to execute arbitrary code via a long "bind DN" parameter.

CVE-2001-1211 ipswitch vulnerability CVSS: 7.5 31 Dec 2001, 05:00 UTC

Ipswitch IMail 7.0.4 and earlier allows attackers with administrator privileges to read and modify user alias and mailing list information for other domains hosted by the same server via the (1) aliasadmin or (2) listadm1 CGI programs, which do not properly verify that an administrator is the administrator for the target domain.

CVE-2001-1283 ipswitch vulnerability CVSS: 7.5 12 Oct 2001, 04:00 UTC

The webmail interface for Ipswitch IMail 7.04 and earlier allows remote authenticated users to cause a denial of service (crash) via a mailbox name that contains a large number of . (dot) or other characters to programs such as (1) readmail.cgi or (2) printmail.cgi, possibly due to a buffer overflow that may allow execution of arbitrary code.

CVE-2001-1284 ipswitch vulnerability CVSS: 7.5 12 Oct 2001, 04:00 UTC

Ipswitch IMail 7.04 and earlier uses predictable session IDs for authentication, which allows remote attackers to hijack sessions of other users.

CVE-2001-1286 ipswitch vulnerability CVSS: 7.5 12 Oct 2001, 04:00 UTC

Ipswitch IMail 7.04 and earlier stores a user's session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control.

CVE-2001-1287 ipswitch vulnerability CVSS: 7.5 12 Oct 2001, 04:00 UTC

Buffer overflow in Web Calendar in Ipswitch IMail 7.04 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request.

CVE-2001-1280 ipswitch vulnerability CVSS: 5.0 12 Oct 2001, 04:00 UTC

POP3 Server for Ipswitch IMail 7.04 and earlier generates different responses to valid and invalid user names, which allows remote attackers to determine users on the system.

CVE-2001-1281 ipswitch vulnerability CVSS: 5.0 12 Oct 2001, 04:00 UTC

Web Messaging Server for Ipswitch IMail 7.04 and earlier allows remote authenticated users to change information for other users by modifying the olduser parameter in the "Change User Information" web form.

CVE-2001-1282 ipswitch vulnerability CVSS: 5.0 12 Oct 2001, 04:00 UTC

Ipswitch IMail 7.04 and earlier records the physical path of attachments in an e-mail message header, which could allow remote attackers to obtain potentially sensitive configuration information.

CVE-2001-1285 ipswitch vulnerability CVSS: 5.0 12 Oct 2001, 04:00 UTC

Directory traversal vulnerability in readmail.cgi for Ipswitch IMail 7.04 and earlier allows remote attackers to access the mailboxes of other users via a .. (dot dot) in the mbx parameter.

CVE-2001-0494 ipswitch vulnerability CVSS: 7.5 27 Jun 2001, 04:00 UTC

Buffer overflow in IPSwitch IMail SMTP server 6.06 and possibly prior versions allows remote attackers to execute arbitrary code via a long From: header.

CVE-2001-0039 ipswitch vulnerability CVSS: 5.0 16 Feb 2001, 05:00 UTC

IPSwitch IMail 6.0.5 allows remote attackers to cause a denial of service using the SMTP AUTH command by sending a base64-encoded user password whose length is between 80 and 136 bytes.

CVE-2000-0825 ipswitch vulnerability CVSS: 5.0 14 Nov 2000, 05:00 UTC

Ipswitch Imail 6.0 allows remote attackers to cause a denial of service via a large number of connections in which a long Host: header is sent, which causes a thread to crash.

CVE-2000-0839 ipswitch vulnerability CVSS: 5.0 14 Nov 2000, 05:00 UTC

WinCOM LPD 1.00.90 allows remote attackers to cause a denial of service via a large number of LPD options to the LPD port (515).

CVE-2000-0780 ipswitch vulnerability CVSS: 6.4 20 Oct 2000, 04:00 UTC

The web server in IPSWITCH IMail 6.04 and earlier allows remote attackers to read and delete arbitrary files via a .. (dot dot) attack.

CVE-2000-0301 ipswitch vulnerability CVSS: 5.0 06 Apr 2000, 04:00 UTC

Ipswitch IMAIL server 6.02 and earlier allows remote attackers to cause a denial of service via the AUTH CRAM-MD5 command.

CVE-2000-0056 ipswitch vulnerability CVSS: 5.0 05 Jan 2000, 05:00 UTC

IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi.

CVE-1999-1497 ipswitch vulnerability CVSS: 7.2 21 Dec 1999, 05:00 UTC

Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts.

CVE-1999-1078 ipswitch vulnerability CVSS: 7.5 29 Jul 1999, 04:00 UTC

WS_FTP Pro 6.0 uses weak encryption for passwords in its initialization files, which allows remote attackers to easily decrypt the passwords and gain privileges.

CVE-2000-0019 ipswitch vulnerability CVSS: 2.1 04 Mar 1999, 05:00 UTC

IMail POP3 daemon uses weak encryption, which allows local users to read files.

CVE-1999-1551 ipswitch vulnerability CVSS: 5.0 02 Mar 1999, 05:00 UTC

Buffer overflow in Ipswitch IMail Service 5.0 allows an attacker to cause a denial of service (crash) and possibly execute arbitrary commands via a long URL.

CVE-1999-1046 ipswitch vulnerability CVSS: 10.0 01 Mar 1999, 05:00 UTC

Buffer overflow in IMonitor in IMail 5.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to port 8181.

CVE-1999-0362 ipswitch vulnerability CVSS: 5.0 02 Feb 1999, 05:00 UTC

WS_FTP server remote denial of service through cwd command.

CVE-1999-1171 ipswitch vulnerability CVSS: 4.6 02 Feb 1999, 05:00 UTC

IPswitch WS_FTP allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.

CVE-1999-1170 ipswitch vulnerability CVSS: 4.6 02 Jan 1999, 05:00 UTC

IPswitch IMail allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.