Vulnerabilities > Netwin > Surgemail
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2012-09-17 | CVE-2012-2575 | Cross-Site Scripting vulnerability in Netwin Surgemail 6.0 Cross-site scripting (XSS) vulnerability in NetWin SurgeMail 6.0a4 allows remote attackers to inject arbitrary web script or HTML via the SRC attribute of an IFRAME element in the body of an HTML e-mail message. | 4.3 |
2011-01-07 | CVE-2010-3201 | Cross-Site Scripting vulnerability in Netwin Surgemail Cross-site scripting (XSS) vulnerability in NetWin Surgemail before 4.3g allows remote attackers to inject arbitrary web script or HTML via the username_ex parameter to the surgeweb program. | 4.3 |
2009-09-08 | CVE-2008-7182 | Buffer Errors vulnerability in Netwin Surgemail 3.9E Buffer overflow in the IMAP service in NetWin Surgemail 3.9e, and possibly other versions before 3.9g2, allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long first argument to the APPEND command, a different vector than CVE-2008-1497 and CVE-2008-1498. | 4.0 |
2008-06-25 | CVE-2008-2859 | Denial of Service vulnerability in SurgeMail IMAP Command Unspecified vulnerability in the IMAP service in NetWin SurgeMail before 3.9g2 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors related to an "imap command." | 5.0 |
2008-03-25 | CVE-2008-1498 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Netwin Surgemail Stack-based buffer overflow in the IMAP service in NetWin Surgemail 3.8k4-4 and earlier allows remote authenticated users to execute arbitrary code via a long first argument to the LIST command. | 9.0 |
2008-03-25 | CVE-2008-1497 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Netwin Surgemail Stack-based buffer overflow in the IMAP service in NetWin SurgeMail 38k4-4 and earlier allows remote authenticated users to execute arbitrary code via long arguments to the LSUB command. | 9.0 |
2008-02-27 | CVE-2008-1055 | USE of Externally-Controlled Format String vulnerability in Netwin Surgemail and Webmail Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter. | 7.5 |
2008-02-27 | CVE-2008-1054 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Netwin Surgemail Stack-based buffer overflow in the _lib_spawn_user_getpid function in (1) swatch.exe and (2) surgemail.exe in NetWin SurgeMail 38k4 and earlier, and beta 39a, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via an HTTP request with multiple long headers to webmail.exe and unspecified other CGI executables, which triggers an overflow when assigning values to environment variables. | 6.4 |
2007-12-20 | CVE-2007-6457 | Buffer Errors vulnerability in Netwin Surgemail 38K4 Stack-based buffer overflow in the webmail feature in SurgeMail 38k4 allows remote attackers to cause a denial of service (crash) via a long Host header. | 5.0 |
2007-08-16 | CVE-2007-4377 | Remote Buffer Overflow vulnerability in Netwin Surgemail 38K Stack-based buffer overflow in the IMAP service in SurgeMail 38k allows remote authenticated users to execute arbitrary code via a long argument to the SEARCH command. network netwin | 6.0 |