Netwin surgemail 3.8k4-4 download

Netwin surgemail 3.8k4-4

NetWin Surgemail k - IMAP (Authenticated) Remote LIST Universal. CVE- Remote exploit for Windows platform. The remote host is vulnerable to a buffer overflow. (Nessus Network Monitor Plugin ID ). Stack-based buffer overflow in the IMAP service in NetWin Surgemail k and earlier allows remote authenticated users to execute arbitrary code via a long.

Stack-based buffer overflow in the IMAP service in NetWin Surgemail k and earlier allows remote authenticated users to execute arbitrary. NetWin Surgemail k IMAP post-auth Remote LIST Universal Exploit. [ Day-ID ]. Full title. NetWin Surgemail k IMAP. AM. Updated: May 07 PM. Credit: Matteo Memelli discovered this vulnerability. Vulnerable: NetWin SurgeMail k Not Vulnerable.

评论: NetWin Surgemail k IMAP post-auth Remote LIST Universal Exploit. 用户评分:. 分,最大5 分. 共0页/0条记录. §发表新评论:. 匿名评论. 评分: 1 2. net user command, 85 NetWin SurgeMail k vulnerability, Network Address Translation (NAT), 25 Network Connections Control Panel, Windows. This exploit only exists on SurgeMail k and has been fixed in recent versions. You can download a copy of k for Windows here.