Page 7 of 51 results (0.004 seconds)

CVSS: 4.3EPSS: 1%CPEs: 9EXPL: 5

Multiple cross-site scripting (XSS) vulnerabilities in NetWin (1) SurgeMail before 2.0c and (2) WebMail allow remote attackers to inject arbitrary web script or HTML via (a) a URI containing the script, or (b) the username field in the login form. NOTE: it is possible that the first attack vector is resultant from the error message issue (CVE-2004-2547). • https://www.exploit-db.com/exploits/24177 http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0056.html http://secunia.com/advisories/11772 http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt http://www.netwinsite.com/surgemail/help/updates.htm http://www.osvdb.org/6746 http://www.securityfocus.com/bid/10483 https://exchange.xforce.ibmcloud.com/vulnerabilities/16320 •

CVSS: 10.0EPSS: 0%CPEs: 14EXPL: 0

Unspecified vulnerability in SurgeMail before 2.2c10 has unknown impact and attack vectors, related to a "Webmail security bug." • http://netwinsite.com/surgemail/help/updates.htm http://secunia.com/advisories/13621 http://www.osvdb.org/12559 http://www.securityfocus.com/bid/12086 https://exchange.xforce.ibmcloud.com/vulnerabilities/18648 •

CVSS: 7.5EPSS: 3%CPEs: 6EXPL: 6

SurgeLDAP 1.0g (Build 12), and possibly other versions before 1.0h, allows remote attackers to bypass authentication for the administration interface via a direct request to admin.cgi with a modified utoken parameter. • https://www.exploit-db.com/exploits/24094 http://netwinsite.com/surgeldap/updates.htm http://secunia.com/advisories/11549 http://securitytracker.com/alerts/2004/May/1010113.html http://securitytracker.com/id?1010068 http://www.osvdb.org/5890 http://www.securityfocus.com/bid/10294 https://exchange.xforce.ibmcloud.com/vulnerabilities/16076 •

CVSS: 5.0EPSS: 1%CPEs: 11EXPL: 2

The administrative interface (surgeftpmgr.cgi) for SurgeFTP Server 1.0b through 2.2k1 allows remote attackers to cause a temporary denial of service (crash) via requests with two percent (%) signs in the CMD parameter. • http://members.lycos.co.uk/r34ct/main/surge_FTP/surge-ftp.txt http://securitytracker.com/id?1008898 http://www.osvdb.org/3788 http://www.secunia.com/advisories/10758 http://www.securityfocus.com/bid/9554 https://exchange.xforce.ibmcloud.com/vulnerabilities/15001 •

CVSS: 7.5EPSS: 5%CPEs: 3EXPL: 0

Buffer overflow in Netwin WebNews CGI program 1.1, Webnews.exe, allows remote attackers to execute arbitrary code via a long group argument. Desbordamiento de búfer en Netwin WebNews CGI program 1.1, Webnews.exe, permite a atacantes remotos ejecutar código arbitrarior mediante un argumento de grupo largo. • ftp://netwinsite.com/pub/webnews/beta/webnews11m_solaris.tar.Z http://marc.info/?l=bugtraq&m=101413521417638&w=2 http://www.iss.net/security_center/static/8220.php http://www.securityfocus.com/bid/4124 •