CVE List

Id CVE No. Status Description Phase Votes Comments Actions
4090  CVE-2001-1286  Candidate  Ipswitch IMail 7.04 and earlier stores a user"s session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker"s control.  Proposed (20020502)  ACCEPT(1) Green | MODIFY(1) Frech | NOOP(4) Cole, Cox, Foat, Wall  Frech> XF:imail-mailbox-directory-traversal(7275)  View
1597  CVE-2000-0019  Candidate  IMail POP3 daemon uses weak encryption, which allows local users to read files.  Proposed (20000111)  ACCEPT(3) Armstrong, Baker, Stracener | MODIFY(2) Frech, Levy | NOOP(1) Christey  Frech> XF:imail-passwords | Levy> BID 880 | Christey> BUGTRAQ:19990304 IMAIL password recovery is trivial. | http://www.securityfocus.com/archive/1/12750 | Christey> Add version numbers (5.0 through 5.08)  View
1477  CVE-1999-1497  Candidate  Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts.  Modified (20070122)  MODIFY(1) Frech | NOOP(3) Cole, Foat, Wall  Frech> XF:imail-passwords(1901) | May be the same as CVE-2000-0019 on a different level of | abstraction.  View
1150  CVE-1999-1170  Candidate  IPswitch IMail allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.  Proposed (20010912)  MODIFY(1) Frech | NOOP(3) Cole, Foat, Wall  Frech> XF:imail-registry(1725)  View
4088  CVE-2001-1284  Candidate  Ipswitch IMail 7.04 and earlier uses predictable session IDs for authentication, which allows remote attackers to hijack sessions of other users.  Proposed (20020502)  ACCEPT(1) Green | MODIFY(1) Frech | NOOP(4) Cole, Cox, Foat, Wall  Frech> XF:imail-session-id-predictable(7278)  View

Page 20794 of 20943, showing 5 records out of 104715 total, starting on record 103966, ending on 103970

Actions