Vendor
Ipswitch, Inc.
Ipswitch is an IT management software developer for small and medium sized businesses. The company was founded in 1991 and is headquartered in Burlington, Massachusetts and has operations in Atlanta (Alpharetta) and Augusta, Georgia, American Fork, Utah, Madison, Wisconsin and Galway, Ireland. Ipswitch sells its products directly, as well as through distributors, resellers and OEMs in the United States, Canada, Latin America, Europe and the Pacific Rim. Since 2019, Ipswitch is part of Progress Software.
Founded 1991
Products
24
CVEs
99
Across products
391
Status
Private
Products
24- 234 CVEs
- 54 CVEs
- 21 CVEs
- 17 CVEs
- 14 CVEs
- 11 CVEs
- 9 CVEs
- 6 CVEs
- 3 CVEs
- 3 CVEs
- 3 CVEs
- 2 CVEs
- 2 CVEs
- 2 CVEs
- 1 CVE
- 1 CVE
- 1 CVE
- 1 CVE
- 1 CVE
- 1 CVE
- 1 CVE
- 1 CVE
- 1 CVE
- 1 CVE
Recent CVEs
99| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-6195 | Cri | 0.64 | 9.8 | 0.00 | May 18, 2017 | Ipswitch MOVEit Transfer (formerly DMZ) allows pre-authentication blind SQL injection. The fixed versions are MOVEit Transfer 2017 9.0.0.201, MOVEit DMZ 8.3.0.30, and MOVEit DMZ 8.2.0.20. | |
| CVE-2015-7678 | Hig | 0.57 | 8.8 | 0.00 | Feb 10, 2016 | Multiple cross-site request forgery (CSRF) vulnerabilities in Ipswitch MOVEit Mobile 1.2.0.962 and earlier allow remote attackers to hijack the authentication of unspecified victims via unknown vectors. | |
| CVE-2017-16513 | Hig | 0.54 | 7.8 | 0.00 | Nov 3, 2017 | Ipswitch WS_FTP Professional before 12.6.0.3 has buffer overflows in the local search field and the backup locations field, aka WSCLT-1729. | |
| CVE-2005-2160 | Hig | 0.49 | 7.5 | 0.01 | Jul 6, 2005 | IMail stores usernames and passwords in cleartext in a cookie, which allows remote attackers to obtain sensitive information. | |
| CVE-2015-7679 | Med | 0.40 | 6.1 | 0.00 | Feb 10, 2016 | Cross-site scripting (XSS) vulnerability in Ipswitch MOVEit Mobile before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via the query string to mobile/. | |
| CVE-2015-7676 | Med | 0.35 | 5.4 | 0.00 | Apr 15, 2016 | Ipswitch MOVEit File Transfer (formerly DMZ) 8.1 and earlier, when configured to support file view on download, allows remote authenticated users to conduct cross-site scripting (XSS) attacks by uploading HTML files. | |
| CVE-2015-7680 | Med | 0.34 | 5.3 | 0.00 | Feb 10, 2016 | Ipswitch MOVEit DMZ before 8.2 provides different error messages for authentication attempts depending on whether the user account exists, which allows remote attackers to enumerate usernames via a series of SOAP requests to machine.aspx. | |
| CVE-2015-7677 | Med | 0.28 | 4.3 | 0.00 | Feb 10, 2016 | The MOVEitISAPI service in Ipswitch MOVEit DMZ before 8.2 provides different error messages depending on whether a FileID exists, which allows remote authenticated users to enumerate FileIDs via the X-siLock-FileID parameter in a download action to MOVEitISAPI/MOVEitISAPI.dll. | |
| CVE-2007-3925 | 0.10 | — | 0.90 | Jul 21, 2007 | Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command. | ||
| CVE-2006-4847 | 0.10 | — | 0.82 | Sep 19, 2006 | Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands. | ||
| CVE-2006-4379 | 0.10 | — | 0.84 | Sep 8, 2006 | Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character. | ||
| CVE-2004-1520 | 0.10 | — | 0.89 | Dec 31, 2004 | Stack-based buffer overflow in IPSwitch IMail 8.13 allows remote authenticated users to execute arbitrary code via a long IMAP DELETE command. | ||
| CVE-2003-0772 | 0.10 | — | 0.83 | Sep 22, 2003 | Multiple buffer overflows in WS_FTP 3 and 4 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via long (1) APPE (append) or (2) STAT (status) arguments. | ||
| CVE-2008-3734 | 0.09 | — | 0.69 | Aug 20, 2008 | Format string vulnerability in Ipswitch WS_FTP Home 2007.0.0.2 and WS_FTP Professional 2007.1.0.0 allows remote FTP servers to cause a denial of service (application crash) or possibly execute arbitrary code via format string specifiers in a connection greeting (response). | ||
| CVE-2007-3927 | 0.09 | — | 0.72 | Jul 21, 2007 | Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to "subscribe." | ||
| CVE-2004-0297 | 0.08 | — | 0.62 | Nov 23, 2004 | Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) in Ipswitch IMail Server 8.03 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via an LDAP message with a large tag length. | ||
| CVE-2005-1939 | 0.07 | — | 0.44 | Dec 31, 2005 | Directory traversal vulnerability in Ipswitch WhatsUp Small Business 2004 allows remote attackers to read arbitrary files via ".." (dot dot) sequences in a request to the Report service (TCP 8022). | ||
| CVE-2004-1135 | 0.07 | — | 0.51 | Jan 10, 2005 | Multiple buffer overflows in WS_FTP Server 5.03 2004.10.14 allow remote attackers to cause a denial of service (service crash) via long (1) SITE, (2) XMKD, (3) MKD, and (4) RNFR commands. | ||
| CVE-1999-1551 | 0.07 | — | 0.45 | Mar 2, 1999 | Buffer overflow in Ipswitch IMail Service 5.0 allows an attacker to cause a denial of service (crash) and possibly execute arbitrary commands via a long URL. | ||
| CVE-2005-1256 | 0.06 | — | 0.75 | May 25, 2005 | Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name. |