This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Netwin First view 2004-12-31
Product Surgemail Last view 2011-01-07
Version 1.6b Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:netwin:surgemail

Activity : Overall

Related : CVE

  Date Alert Description
4.3 2011-01-07 CVE-2010-3201

Cross-site scripting (XSS) vulnerability in NetWin Surgemail before 4.3g allows remote attackers to inject arbitrary web script or HTML via the username_ex parameter to the surgeweb program.

5 2008-06-25 CVE-2008-2859

Unspecified vulnerability in the IMAP service in NetWin SurgeMail before 3.9g2 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors related to an "imap command."

9 2008-03-25 CVE-2008-1498

Stack-based buffer overflow in the IMAP service in NetWin Surgemail 3.8k4-4 and earlier allows remote authenticated users to execute arbitrary code via a long first argument to the LIST command.

7.5 2008-02-27 CVE-2008-1055

Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter.

4.3 2004-12-31 CVE-2004-2548

Multiple cross-site scripting (XSS) vulnerabilities in NetWin (1) SurgeMail before 2.0c and (2) WebMail allow remote attackers to inject arbitrary web script or HTML via (a) a URI containing the script, or (b) the username field in the login form. NOTE: it is possible that the first attack vector is resultant from the error message issue (CVE-2004-2547).

2.6 2004-12-31 CVE-2004-2547

NetWin (1) SurgeMail before 2.0c and (2) WebMail allow remote attackers to obtain sensitive information via HTTP requests that (a) specify the / URI, (b) specify the /scripts/ URI, or (c) specify a non-existent file, which reveal the path in an error message.

CWE : Common Weakness Enumeration

%idName
33% (1) CWE-134 Uncontrolled Format String
33% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
33% (1) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')

Open Source Vulnerability Database (OSVDB)

id Description
68323 SurgeMail SurgeWeb /surgeweb username_ex Parameter XSS
46434 SurgeMail IMAP APPEND Command Handling Unspecified DoS
43853 SurgeMail IMAP Service LIST Command Argument Handling Remote Overflow
42981 SurgeMail webmail.exe page Variable Remote Format String
6746 SurgeMail/WebMail Login Form XSS
6745 SurgeMail/WebMail Error Message Path Disclosure

OpenVAS Exploits

id Description
2011-01-18 Name : SurgeMail SurgeWeb Cross Site Scripting Vulnerability
File : nvt/gb_surgemail_surgeweb_xss_vuln.nasl
2010-10-05 Name : SurgeMail SurgeWeb Cross Site Scripting Vulnerability
File : nvt/gb_surgemail_43679.nasl

Snort® IPS/IDS

Date Description
2014-01-10 SurgeMail webmail.exe page format string exploit attempt
RuleID : 21609 - Type : SERVER-WEBAPP - Revision : 6

Nessus® Vulnerability Scanner

id Description
2010-10-04 Name: The remote web server is affected by a cross-site scripting vulnerability.
File: surgemail_surgeweb_xss.nasl - Type: ACT_ATTACK
2008-06-30 Name: The remote mail server is prone to denial of service attacks.
File: surgemail_imap_command_unspecified_dos.nasl - Type: ACT_GATHER_INFO