Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netwin dmail 2.8f vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0490
Buffer overflow in the NetWin DSMTP 2.7q in the NetWin dmail package allows remote malicious users to execute arbitrary commands via a long ETRN request.
Netwin Dmail 2.7
Netwin Dmail 2.8f
Netwin Dmail 2.8g
Netwin Dmail 2.7q
Netwin Dmail 2.8e
Netwin Dmail 2.8h
1 EDB exploit
NA
CVE-2001-1354
NetWin Authentication module (NWAuth) 2.0 and 3.0b, as implemented in SurgeFTP, DMail, and possibly other packages, uses weak password hashing, which could allow local users to decrypt passwords or use a different password that has the same hash value as the correct password.
Netwin Dmail 2.8g
Netwin Dmail 2.8h
Netwin Dmail 2.8e
Netwin Dmail 2.8f
Netwin Dmail 2.7q
Netwin Dmail 2.7r
Netwin Surgeftp 2.0a
Netwin Surgeftp 2.0b
Netwin Dmail 2.5d
Netwin Dmail 2.7
Netwin Dmail 2.8i
Netwin Surgeftp 1.0b
1 EDB exploit
NA
CVE-2001-1355
Buffer overflows in NetWin Authentication Module (NWAuth) 3.0b and previous versions, as implemented in DMail, SurgeFTP, and possibly other packages, could allow malicious users to execute arbitrary code via long arguments to (1) the -del command or (2) the -lookup command.
Netwin Dmail 2.7
Netwin Dmail 2.7q
Netwin Surgeftp 2.0a
Netwin Surgeftp 2.0b
Netwin Dmail 2.5d
Netwin Dmail 2.8h
Netwin Dmail 2.8i
Netwin Surgeftp 1.0b
Netwin Dmail 2.8f
Netwin Dmail 2.8g
Netwin Dmail 2.7r
Netwin Dmail 2.8e
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-35229
privilege escalation
local users
CVE-2024-5405
CVE-2024-27842
CVE-2024-5274
CVE-2024-5378
CVE-2024-34152
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started