Main / Productivity / Surgemail 3.8
Name: Surgemail 3.8
File size: 559mb
SurgeMail -- Features integrated mail server and web based email, ssl secure We are constantly developing SurgeMail to provide you with: SurgeMail # NetWin Surgemail 0DAY (IMAP POST AUTH) Remote LIST Universal Exploit. # Affected Versions: Version k Windows Platform. # [* NetWin Surgemail 0DAY (IMAP POST AUTH) Remote LIST Exploit *].
Successfully exploiting this issue may allow remote attackers to execute arbitrary machine code in the context of the affected service. SurgeMail u January (Webmail t-4). New: New setting g_spam_from_blacklist; Fix: OSX mail client not handling some imap responses nicely; Fix.
Security vulnerabilities of Netwin Surgemail version k4 List of cve security vulnerabilities related to this exact version. You can filter results by cvss scores. Netwin Surgemail version i: Security vulnerabilities, exploits, vulnerability statistics, CVSS scores and references. The remote host is vulnerable to a buffer overflow. (Nessus Network Monitor Plugin ID ). Stack-based buffer overflow in the IMAP service in NetWin Surgemail k and earlier allows remote authenticated users to execute arbitrary code via a long.
A vulnerability classified as very critical has been found in NetWin Surgemail k4. 14 Mar NetWin Surgemail k - IMAP Authenticated Remote LIST Universal. CVE- Remote exploit for Windows platform. Stack-based buffer overflow in the IMAP.