Page 2 of 9 results (0.010 seconds)

CVSS: 7.5EPSS: 92%CPEs: 25EXPL: 2

Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter. Vulnerabilidad de cadena de formato en webmail.exe de NetWin SurgeMail 38k4 y versiones anteriores y beta 39a, y WebMail 3.1s y versiones anteriores, permite a atacantes remotos provocar una denegación de servicio (caída del demonio) y posiblemente ejecutar código de su elección a través de cadenas de formato especificadas en el parámetro page. • https://www.exploit-db.com/exploits/31300 http://aluigi.altervista.org/adv/surgemailz-adv.txt http://secunia.com/advisories/29105 http://secunia.com/advisories/29137 http://securityreason.com/securityalert/3705 http://www.securityfocus.com/archive/1/488741/100/0/threaded http://www.securityfocus.com/bid/27990 http://www.securitytracker.com/id?1019500 http://www.vupen.com/english/advisories/2008/0678 https://exchange.xforce.ibmcloud.com/vulnerabilities/40833 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 4.3EPSS: 1%CPEs: 9EXPL: 5

Multiple cross-site scripting (XSS) vulnerabilities in NetWin (1) SurgeMail before 2.0c and (2) WebMail allow remote attackers to inject arbitrary web script or HTML via (a) a URI containing the script, or (b) the username field in the login form. NOTE: it is possible that the first attack vector is resultant from the error message issue (CVE-2004-2547). • https://www.exploit-db.com/exploits/24177 http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0056.html http://secunia.com/advisories/11772 http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt http://www.netwinsite.com/surgemail/help/updates.htm http://www.osvdb.org/6746 http://www.securityfocus.com/bid/10483 https://exchange.xforce.ibmcloud.com/vulnerabilities/16320 •

CVSS: 10.0EPSS: 0%CPEs: 14EXPL: 0

Unspecified vulnerability in SurgeMail before 2.2c10 has unknown impact and attack vectors, related to a "Webmail security bug." • http://netwinsite.com/surgemail/help/updates.htm http://secunia.com/advisories/13621 http://www.osvdb.org/12559 http://www.securityfocus.com/bid/12086 https://exchange.xforce.ibmcloud.com/vulnerabilities/18648 •

CVSS: 2.6EPSS: 1%CPEs: 46EXPL: 5

NetWin (1) SurgeMail before 2.0c and (2) WebMail allow remote attackers to obtain sensitive information via HTTP requests that (a) specify the / URI, (b) specify the /scripts/ URI, or (c) specify a non-existent file, which reveal the path in an error message. • https://www.exploit-db.com/exploits/24176 http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0056.html http://secunia.com/advisories/11772 http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt http://www.netwinsite.com/surgemail/help/updates.htm http://www.osvdb.org/6745 http://www.securityfocus.com/bid/10483 https://exchange.xforce.ibmcloud.com/vulnerabilities/16319 •