CVE-2005-0846
https://notcve.org/view.php?id=CVE-2005-0846
Multiple cross-site scripting (XSS) vulnerabilities in the email auto-reply message in SurgeMail 2.2g3 allow remote attackers to inject arbitrary web script or HTML via the (1) message subject or (2) message header field. • http://marc.info/?l=bugtraq&m=111159967417903&w=2 http://netwinsite.com/cgi/dnewsweb.cgi?cmd=article&group=netwin.surgemail&item=8814&utag= http://secunia.com/advisories/14658 http://www.security.org.sg/vuln/surgemail22g3.html •
CVE-2004-2548 – NetWin Surgemail 1.8/1.9/2.0 / WebMail 3.1 - Login Form Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2004-2548
Multiple cross-site scripting (XSS) vulnerabilities in NetWin (1) SurgeMail before 2.0c and (2) WebMail allow remote attackers to inject arbitrary web script or HTML via (a) a URI containing the script, or (b) the username field in the login form. NOTE: it is possible that the first attack vector is resultant from the error message issue (CVE-2004-2547). • https://www.exploit-db.com/exploits/24177 http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0056.html http://secunia.com/advisories/11772 http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt http://www.netwinsite.com/surgemail/help/updates.htm http://www.osvdb.org/6746 http://www.securityfocus.com/bid/10483 https://exchange.xforce.ibmcloud.com/vulnerabilities/16320 •
CVE-2004-2537
https://notcve.org/view.php?id=CVE-2004-2537
Unspecified vulnerability in SurgeMail before 2.2c10 has unknown impact and attack vectors, related to a "Webmail security bug." • http://netwinsite.com/surgemail/help/updates.htm http://secunia.com/advisories/13621 http://www.osvdb.org/12559 http://www.securityfocus.com/bid/12086 https://exchange.xforce.ibmcloud.com/vulnerabilities/18648 •
CVE-2004-2547 – NetWin Surgemail 1.8/1.9/2.0 / WebMail 3.1 - Error Message Full Path Disclosure
https://notcve.org/view.php?id=CVE-2004-2547
NetWin (1) SurgeMail before 2.0c and (2) WebMail allow remote attackers to obtain sensitive information via HTTP requests that (a) specify the / URI, (b) specify the /scripts/ URI, or (c) specify a non-existent file, which reveal the path in an error message. • https://www.exploit-db.com/exploits/24176 http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0056.html http://secunia.com/advisories/11772 http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt http://www.netwinsite.com/surgemail/help/updates.htm http://www.osvdb.org/6745 http://www.securityfocus.com/bid/10483 https://exchange.xforce.ibmcloud.com/vulnerabilities/16319 •