5 results (0.003 seconds)

CVSS: 4.6EPSS: 1%CPEs: 17EXPL: 0

Buffer overflow in CWMail.exe in NetWin before 2.8a allows remote authenticated users to execute arbitrary code via a long item parameter. Desbordamiento de búfer en CWMail.exe en NetWin anteriores a 2.8a permite a usuarios remotos remotos ejecutar código arbitrario mediante un parámetro largo. • http://marc.info/?l=bugtraq&m=101362100602008&w=2 http://www.iss.net/security_center/static/8185.php http://www.securityfocus.com/bid/4093 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

NetWin dMailWeb and cwMail 2.6g and earlier allows remote attackers to bypass authentication and use the server for mail relay via a username that contains a carriage return. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0243.html http://www.securityfocus.com/bid/1390 https://exchange.xforce.ibmcloud.com/vulnerabilities/4770 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

The default configuration of NetWin dMailWeb and cwMail trusts all POP servers, which allows attackers to bypass normal authentication and cause a denial of service. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0243.html http://www.securityfocus.com/bid/1391 https://exchange.xforce.ibmcloud.com/vulnerabilities/4771 •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

NetWin dMailWeb and cwMail 2.6g and earlier allows remote attackers to cause a denial of service via a long username parameter. • http://www.securityfocus.com/bid/1376 http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-15&msg=4.1.20000621113334.00996820%40qlink.queensu.ca •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 1

NetWin dMailWeb and cwMail 2.6i and earlier allows remote attackers to cause a denial of service via a long POP parameter (pophost). • http://www.securityfocus.com/bid/1376 http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-15&msg=4.1.20000621113334.00996820%40qlink.queensu.ca •