CVE-2001-1211

N/A Unknown
Published: December 31, 2001 Modified: April 16, 2026
View on NVD

Description

Ipswitch IMail 7.0.4 and earlier allows attackers with administrator privileges to read and modify user alias and mailing list information for other domains hosted by the same server via the (1) aliasadmin or (2) listadm1 CGI programs, which do not properly verify that an administrator is the administrator for the target domain.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.iss.net/security_center/static/7752.php
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/archive/1/247786
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/3766
Source: cve@mitre.org
Vendor Advisory
http://support.ipswitch.com/kb/IM-20011219-DM01.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.ipswitch.com/kb/IM-20020301-DM02.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.iss.net/security_center/static/7752.php
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/247786
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/3766
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
27th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

ipswitch