Ipswitch : Security Vulnerabilities, CVEs, Published In 1999
IMail POP3 daemon uses weak encryption, which allows local users to read files.
Max CVSS
2.1
EPSS Score
0.04%
Published
1999-03-04
Updated
2022-08-17
Buffer overflow in Ipswitch IMail Service 5.0 allows an attacker to cause a denial of service (crash) and possibly execute arbitrary commands via a long URL.
Max CVSS
5.0
EPSS Score
91.74%
Published
1999-03-02
Updated
2017-12-19
Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts.
Max CVSS
7.2
EPSS Score
0.04%
Published
1999-12-21
Updated
2008-09-05
IPswitch WS_FTP allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.
Max CVSS
4.6
EPSS Score
0.05%
Published
1999-02-02
Updated
2023-10-11
IPswitch IMail allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.
Max CVSS
4.6
EPSS Score
0.05%
Published
1999-01-02
Updated
2023-10-11
WS_FTP Pro 6.0 uses weak encryption for passwords in its initialization files, which allows remote attackers to easily decrypt the passwords and gain privileges.
Max CVSS
7.5
EPSS Score
0.29%
Published
1999-07-29
Updated
2008-09-05
Buffer overflow in IMonitor in IMail 5.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to port 8181.
Max CVSS
10.0
EPSS Score
3.35%
Published
1999-03-01
Updated
2017-12-19
WS_FTP server remote denial of service through cwd command.
Max CVSS
5.0
EPSS Score
0.19%
Published
1999-02-02
Updated
2008-09-09
8 vulnerabilities found