CVE-2005-1516
https://notcve.org/view.php?id=CVE-2005-1516
DList (dlist.exe) in DMail 3.1a allows remote attackers to bypass authentication, read log files, and shutdown the system via a sendlog command with an incorrect password hash, which is not properly handled by the _cmd_sendlog function. • http://secunia.com/advisories/15242 http://www.security.org.sg/vuln/dmail31a.html http://www.securityfocus.com/bid/13497 https://exchange.xforce.ibmcloud.com/vulnerabilities/20412 •
CVE-2005-1478
https://notcve.org/view.php?id=CVE-2005-1478
Format string vulnerability in dSMTP (dsmtp.exe) in DMail 3.1a allows remote attackers to execute arbitrary code via format string specifiers in the xtellmail command. • http://marc.info/?l=bugtraq&m=111531804617905&w=2 http://secunia.com/advisories/15242 http://securitytracker.com/id?1013885 http://www.security.org.sg/vuln/dmail31a.html http://www.securityfocus.com/bid/13505 https://exchange.xforce.ibmcloud.com/vulnerabilities/20414 •
CVE-2001-1355
https://notcve.org/view.php?id=CVE-2001-1355
Buffer overflows in NetWin Authentication Module (NWAuth) 3.0b and earlier, as implemented in DMail, SurgeFTP, and possibly other packages, could allow attackers to execute arbitrary code via long arguments to (1) the -del command or (2) the -lookup command. • http://online.securityfocus.com/archive/1/198293 http://www.securityfocus.com/bid/3077 https://exchange.xforce.ibmcloud.com/vulnerabilities/6865 •
CVE-2001-1354 – NetWin DMail 2.x / SurgeFTP 1.0/2.0 - Weak Password Encryption
https://notcve.org/view.php?id=CVE-2001-1354
NetWin Authentication module (NWAuth) 2.0 and 3.0b, as implemented in SurgeFTP, DMail, and possibly other packages, uses weak password hashing, which could allow local users to decrypt passwords or use a different password that has the same hash value as the correct password. • https://www.exploit-db.com/exploits/21020 http://online.securityfocus.com/archive/1/198293 http://www.securityfocus.com/bid/3075 https://exchange.xforce.ibmcloud.com/vulnerabilities/6866 •
CVE-2000-0490 – NetWin DMail 2.7/2.8 - ETRN Buffer Overflow
https://notcve.org/view.php?id=CVE-2000-0490
Buffer overflow in the NetWin DSMTP 2.7q in the NetWin dmail package allows remote attackers to execute arbitrary commands via a long ETRN request. • https://www.exploit-db.com/exploits/19983 http://archives.neohapsis.com/archives/bugtraq/2000-05/0407.html http://netwinsite.com/dmail/security.htm http://www.securityfocus.com/bid/1297 https://exchange.xforce.ibmcloud.com/vulnerabilities/4579 •