exploit-db-mirror/exploits/windows/dos/31300.txt
Offensive Security ec8ac60c13 DB: 2022-11-22
93 changes to exploits/shellcodes/ghdb
2022-11-22 11:08:59 +00:00

12 lines
No EOL
652 B
Text

source: https://www.securityfocus.com/bid/27990/info
SurgeMail and WebMail are prone to a remote format-string vulnerability because the applications fail to properly sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function.
A remote attacker may execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will result in a denial of service.
This issue affects the following:
SurgeMail 38k4, beta 39a and earlier
Netwin WebMail 3.1s and earlier
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31301.zip