Page 2 of 18 results (0.007 seconds)

CVSS: 9.0EPSS: 91%CPEs: 39EXPL: 3

Stack-based buffer overflow in the IMAP service in NetWin SurgeMail 38k4-4 and earlier allows remote authenticated users to execute arbitrary code via long arguments to the LSUB command. Desbordamiento de búfer basado en Pila en el servicio IMAP de NetWin SurgeMail 38k4-4 y versiones anteriores, permite a usuarios remotos autenticados ejecutar código de su elección mediante argumentos largos del comando LSUB. • http://secunia.com/advisories/29105 http://securityreason.com/securityalert/3774 http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-03-07 http://www.netwinsite.com/surgemail/help/updates.htm http://www.securityfocus.com/archive/1/489959/100/0/threaded http://www.securityfocus.com/bid/28377 https://exchange.xforce.ibmcloud.com/vulnerabilities/41402 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.4EPSS: 90%CPEs: 27EXPL: 3

Stack-based buffer overflow in the _lib_spawn_user_getpid function in (1) swatch.exe and (2) surgemail.exe in NetWin SurgeMail 38k4 and earlier, and beta 39a, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via an HTTP request with multiple long headers to webmail.exe and unspecified other CGI executables, which triggers an overflow when assigning values to environment variables. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer basado en pila en la función _lib_spawn_user_getpid de (1) swatch.exe y (2) surgemail.exe en NetWin SurgeMail 38k4 y versiones anteriores, y beta 39a, permite a atacantes remotos provocar una denegación de servicio (caída del demonio) y posiblemente ejecutar código de su elección a través de una petición HTTP con múltiples cabeceras largas de webmail.exe y otros ejecutables CGI no especificados, lo cual dispara un desbordamiento cuando asignan valores a variables de entorno. NOTA: parte de esta información ha sido obtenida a partir de la información de terceros. • https://www.exploit-db.com/exploits/31301 http://aluigi.altervista.org/adv/surgemailz-adv.txt http://secunia.com/advisories/29105 http://securityreason.com/securityalert/3705 http://www.securityfocus.com/archive/1/488741/100/0/threaded http://www.securityfocus.com/bid/27992 http://www.securitytracker.com/id?1019500 http://www.vupen.com/english/advisories/2008/0678 https://exchange.xforce.ibmcloud.com/vulnerabilities/40834 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 92%CPEs: 25EXPL: 2

Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter. Vulnerabilidad de cadena de formato en webmail.exe de NetWin SurgeMail 38k4 y versiones anteriores y beta 39a, y WebMail 3.1s y versiones anteriores, permite a atacantes remotos provocar una denegación de servicio (caída del demonio) y posiblemente ejecutar código de su elección a través de cadenas de formato especificadas en el parámetro page. • https://www.exploit-db.com/exploits/31300 http://aluigi.altervista.org/adv/surgemailz-adv.txt http://secunia.com/advisories/29105 http://secunia.com/advisories/29137 http://securityreason.com/securityalert/3705 http://www.securityfocus.com/archive/1/488741/100/0/threaded http://www.securityfocus.com/bid/27990 http://www.securitytracker.com/id?1019500 http://www.vupen.com/english/advisories/2008/0678 https://exchange.xforce.ibmcloud.com/vulnerabilities/40833 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 5.0EPSS: 6%CPEs: 1EXPL: 3

Stack-based buffer overflow in the webmail feature in SurgeMail 38k4 allows remote attackers to cause a denial of service (crash) via a long Host header. Desbordamiento de búfer basado en pila en la funcionalidad webmail de SurgeMail 38k4 permite a atacantes remotos provocar una denegación de servicio (caída) mediante una cabecera Host larga. • https://www.exploit-db.com/exploits/4748 http://retrogod.altervista.org/rgod_surgemail_crash.html http://secunia.com/advisories/28142 http://securityreason.com/securityalert/3464 http://www.securityfocus.com/archive/1/485224/100/0/threaded http://www.securityfocus.com/bid/26901 http://www.vupen.com/english/advisories/2007/4245 https://exchange.xforce.ibmcloud.com/vulnerabilities/39087 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.0EPSS: 1%CPEs: 1EXPL: 1

Stack-based buffer overflow in the IMAP service in SurgeMail 38k allows remote authenticated users to execute arbitrary code via a long argument to the SEARCH command. NOTE: this might overlap CVE-2007-4372. Desbordamiento de búfer en el servicio IMAP de SurgeMail 38k permite a usuarios remotos autenticados ejecutar código de su elección mediante un argumento largo para el comando SEARCH. NOTA: podría solaparse con CVE-2007-4372. • https://www.exploit-db.com/exploits/4287 http://marc.info/?l=full-disclosure&m=118710179924684&w=2 http://secunia.com/advisories/26464 http://www.securityfocus.com/bid/25318 http://www.vupen.com/english/advisories/2007/2875 https://exchange.xforce.ibmcloud.com/vulnerabilities/36009 •