Vulnerabilities
Vulnerable Software
Netwin:  >> Dmail  Security Vulnerabilities
Format string vulnerability in dSMTP (dsmtp.exe) in DMail 3.1a allows remote attackers to execute arbitrary code via format string specifiers in the xtellmail command.
CVSS Score
7.5
EPSS Score
0.062
Published
2005-05-11
DList (dlist.exe) in DMail 3.1a allows remote attackers to bypass authentication, read log files, and shutdown the system via a sendlog command with an incorrect password hash, which is not properly handled by the _cmd_sendlog function.
CVSS Score
7.5
EPSS Score
0.006
Published
2005-05-11
NetWin Authentication module (NWAuth) 2.0 and 3.0b, as implemented in SurgeFTP, DMail, and possibly other packages, uses weak password hashing, which could allow local users to decrypt passwords or use a different password that has the same hash value as the correct password.
CVSS Score
4.6
EPSS Score
0.001
Published
2001-07-20
Buffer overflows in NetWin Authentication Module (NWAuth) 3.0b and earlier, as implemented in DMail, SurgeFTP, and possibly other packages, could allow attackers to execute arbitrary code via long arguments to (1) the -del command or (2) the -lookup command.
CVSS Score
10.0
EPSS Score
0.013
Published
2001-07-20
Buffer overflow in the NetWin DSMTP 2.7q in the NetWin dmail package allows remote attackers to execute arbitrary commands via a long ETRN request.
CVSS Score
10.0
EPSS Score
0.051
Published
2000-06-01
Buffer overflow in Netwin DMailWeb CGI program allows remote attackers to execute arbitrary commands via a long utoken parameter.
CVSS Score
7.5
EPSS Score
0.018
Published
2000-05-04


Contact Us

Shodan ® - All rights reserved