Vulnerabilities > Netwin > Dmail
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2005-05-11 | CVE-2005-1516 | Remote Authentication Bypass vulnerability in Netwin Dmail 3.1A DList (dlist.exe) in DMail 3.1a allows remote attackers to bypass authentication, read log files, and shutdown the system via a sendlog command with an incorrect password hash, which is not properly handled by the _cmd_sendlog function. | 7.5 |
2005-05-11 | CVE-2005-1478 | Remote Format String vulnerability in Netwin Dmail 3.1A/3.1B Format string vulnerability in dSMTP (dsmtp.exe) in DMail 3.1a allows remote attackers to execute arbitrary code via format string specifiers in the xtellmail command. | 7.5 |
2001-07-20 | CVE-2001-1355 | Buffer Overflow vulnerability in Netwin NWAuth Buffer overflows in NetWin Authentication Module (NWAuth) 3.0b and earlier, as implemented in DMail, SurgeFTP, and possibly other packages, could allow attackers to execute arbitrary code via long arguments to (1) the -del command or (2) the -lookup command. | 10.0 |
2001-07-20 | CVE-2001-1354 | Weak Password Encryption vulnerability in Netwin NWAuth NetWin Authentication module (NWAuth) 2.0 and 3.0b, as implemented in SurgeFTP, DMail, and possibly other packages, uses weak password hashing, which could allow local users to decrypt passwords or use a different password that has the same hash value as the correct password. | 4.6 |
2000-06-01 | CVE-2000-0490 | Unspecified vulnerability in Netwin Dmail Buffer overflow in the NetWin DSMTP 2.7q in the NetWin dmail package allows remote attackers to execute arbitrary commands via a long ETRN request. | 10.0 |
2000-05-04 | CVE-2000-0422 | Buffer Overflow vulnerability in Netwin Dmail 2.5D Buffer overflow in Netwin DMailWeb CGI program allows remote attackers to execute arbitrary commands via a long utoken parameter. | 7.5 |