Page 5 of 51 results (0.005 seconds)

CVSS: 7.5EPSS: 10%CPEs: 5EXPL: 0

Unspecified vulnerability in NetWin Webmail 3.1s-1 in SurgeMail before 3.8i2 has unknown impact and remote attack vectors, possibly a format string vulnerability that allows remote code execution. Una vulnerabilidad no especificada en NetWin Webmail versión 3.1s-1 en SurgeMail versiones anteriores a 3.8i2, presenta un impacto desconocido y vectores de ataque remoto, posiblemente una vulnerabilidad de cadena de formato que permite la ejecución de código remota. • http://osvdb.org/35891 http://secunia.com/advisories/25207 http://www.netwinsite.com/surgemail/help/updates.htm http://www.securityfocus.com/bid/23908 http://www.vupen.com/english/advisories/2007/1755 https://exchange.xforce.ibmcloud.com/vulnerabilities/34217 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 7.5EPSS: 8%CPEs: 5EXPL: 1

PHP remote file inclusion vulnerability in parse/parser.php in WEB//NEWS (aka webnews) 1.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the WN_BASEDIR parameter. Vulnerabilidad PHP de inclusión remota de archivo en parse/parser.php en WEB//NEWS (también conocido como webnews) 1.4 y anteriores permite a atacantes remotos ejecutar código php de su elección mediante una URL en el parámetro WN_BASEDIR. • https://www.exploit-db.com/exploits/2435 http://secunia.com/advisories/22076 http://securityreason.com/securityalert/1659 http://securitytracker.com/id?1016938 http://www.securityfocus.com/archive/1/446996/100/0/threaded http://www.securityfocus.com/bid/20239 http://www.vupen.com/english/advisories/2006/3797 https://exchange.xforce.ibmcloud.com/vulnerabilities/29167 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in NetWin SurgeMail 3.0c2 allows remote attackers to inject arbitrary web script or HTML via unknown vectors. • http://secunia.com/advisories/15425 http://www.vupen.com/english/advisories/2005/0576 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

DList (dlist.exe) in DMail 3.1a allows remote attackers to bypass authentication, read log files, and shutdown the system via a sendlog command with an incorrect password hash, which is not properly handled by the _cmd_sendlog function. • http://secunia.com/advisories/15242 http://www.security.org.sg/vuln/dmail31a.html http://www.securityfocus.com/bid/13497 https://exchange.xforce.ibmcloud.com/vulnerabilities/20412 •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 1

Format string vulnerability in dSMTP (dsmtp.exe) in DMail 3.1a allows remote attackers to execute arbitrary code via format string specifiers in the xtellmail command. • http://marc.info/?l=bugtraq&m=111531804617905&w=2 http://secunia.com/advisories/15242 http://securitytracker.com/id?1013885 http://www.security.org.sg/vuln/dmail31a.html http://www.securityfocus.com/bid/13505 https://exchange.xforce.ibmcloud.com/vulnerabilities/20414 •