Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and previous versions and beta 39a, and WebMail 3.1s and previous versions, allows remote malicious users to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
netwin surgemail 3.0c2 |
||
netwin surgemail 2.2a6 |
||
netwin surgemail 1.8e |
||
netwin surgemail 39a |
||
netwin surgemail 2.0g2 |
||
netwin surgemail 2.0e |
||
netwin surgemail 2.1a |
||
netwin surgemail beta 39a |
||
netwin surgemail 2.0c |
||
netwin surgemail 2.2g2 |
||
netwin surgemail |
||
netwin surgemail 2.2c10 |
||
netwin surgemail 2.2g3 |
||
netwin surgemail 1.8d |
||
netwin surgemail 1.8b3 |
||
netwin surgemail 2.2c9 |
||
netwin surgemail 1.8g3 |
||
netwin surgemail 1.8a |
||
netwin surgemail 1.9 |
||
netwin surgemail 2.0a2 |
||
netwin surgemail 2.1c7 |
||
netwin surgemail 3.8f3 |
||
netwin webmail |
||
netwin surgemail 1.9b2 |
||
netwin surgemail 3.0a |