CVE List

Id CVE No. Status Description Phase Votes Comments Actions
4088  CVE-2001-1284  Candidate  Ipswitch IMail 7.04 and earlier uses predictable session IDs for authentication, which allows remote attackers to hijack sessions of other users.  Proposed (20020502)  ACCEPT(1) Green | MODIFY(1) Frech | NOOP(4) Cole, Cox, Foat, Wall  Frech> XF:imail-session-id-predictable(7278)  View
1150  CVE-1999-1170  Candidate  IPswitch IMail allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.  Proposed (20010912)  MODIFY(1) Frech | NOOP(3) Cole, Foat, Wall  Frech> XF:imail-registry(1725)  View
1477  CVE-1999-1497  Candidate  Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts.  Modified (20070122)  MODIFY(1) Frech | NOOP(3) Cole, Foat, Wall  Frech> XF:imail-passwords(1901) | May be the same as CVE-2000-0019 on a different level of | abstraction.  View
1597  CVE-2000-0019  Candidate  IMail POP3 daemon uses weak encryption, which allows local users to read files.  Proposed (20000111)  ACCEPT(3) Armstrong, Baker, Stracener | MODIFY(2) Frech, Levy | NOOP(1) Christey  Frech> XF:imail-passwords | Levy> BID 880 | Christey> BUGTRAQ:19990304 IMAIL password recovery is trivial. | http://www.securityfocus.com/archive/1/12750 | Christey> Add version numbers (5.0 through 5.08)  View
4089  CVE-2001-1285  Candidate  Directory traversal vulnerability in readmail.cgi for Ipswitch IMail 7.04 and earlier allows remote attackers to access the mailboxes of other users via a .. (dot dot) in the mbx parameter.  Proposed (20020502)  ACCEPT(1) Green | MODIFY(1) Frech | NOOP(4) Cole, Cox, Foat, Wall  Frech> XF:imail-mailbox-directory-traversal(7275)  View

Page 150 of 20943, showing 5 records out of 104715 total, starting on record 746, ending on 750

Actions