cpe:/a:netwin:surgemail:1.8g3 cpe:/a:netwin:surgemail:1.9b2 cpe:/a:netwin:surgemail:2.0a2 cpe:/a:netwin:surgemail:2.0c cpe:/a:netwin:surgemail:2.0e cpe:/a:netwin:surgemail:2.0g2 cpe:/a:netwin:surgemail:2.1c7 cpe:/a:netwin:surgemail:2.2a6 cpe:/a:netwin:surgemail:2.2c10 cpe:/a:netwin:surgemail:2.2g2 cpe:/a:netwin:surgemail:2.2g3 cpe:/a:netwin:surgemail:3.0a cpe:/a:netwin:surgemail:3.0c2 cpe:/a:netwin:surgemail:3.2e cpe:/a:netwin:surgemail:3.5a cpe:/a:netwin:surgemail:3.5b3 cpe:/a:netwin:surgemail:3.6d cpe:/a:netwin:surgemail:3.6f3 cpe:/a:netwin:surgemail:3.6f5 cpe:/a:netwin:surgemail:3.6f7 cpe:/a:netwin:surgemail:3.7b cpe:/a:netwin:surgemail:3.7b3 cpe:/a:netwin:surgemail:3.7b5 cpe:/a:netwin:surgemail:3.7b6 cpe:/a:netwin:surgemail:3.7b7 cpe:/a:netwin:surgemail:3.7b8 cpe:/a:netwin:surgemail:3.8a cpe:/a:netwin:surgemail:3.8b cpe:/a:netwin:surgemail:3.8d cpe:/a:netwin:surgemail:3.8f cpe:/a:netwin:surgemail:3.8f2 cpe:/a:netwin:surgemail:3.8f3 cpe:/a:netwin:surgemail:3.8i cpe:/a:netwin:surgemail:3.8i2 cpe:/a:netwin:surgemail:3.8i3 cpe:/a:netwin:surgemail:3.8k cpe:/a:netwin:surgemail:3.8k2 cpe:/a:netwin:surgemail:3.8k3 cpe:/a:netwin:surgemail:3.8m CVE-2008-1497 2008-03-25T15:44:00.000-04:00 2017-08-07T21:30:12.527-04:00 9.0 NETWORK LOW SINGLE_INSTANCE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2008-03-25T17:00:00.000-04:00 ALLOWS_ADMIN_ACCESS BUGTRAQ 20080321 [INFIGO-2008-03-07]: Surgemail 38k4 IMAP server remote stack overflow BID 28377 SECUNIA 29105 SREASON 3774 MISC http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-03-07 MISC http://www.netwinsite.com/surgemail/help/updates.htm XF surgemail-imap-lsub-bo(41402) Stack-based buffer overflow in the IMAP service in NetWin SurgeMail 38k4-4 and earlier allows remote authenticated users to execute arbitrary code via long arguments to the LSUB command.