Vulnerability Details : CVE-2001-1355
Buffer overflows in NetWin Authentication Module (NWAuth) 3.0b and earlier, as implemented in DMail, SurgeFTP, and possibly other packages, could allow attackers to execute arbitrary code via long arguments to (1) the -del command or (2) the -lookup command.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2001-1355
Probability of exploitation activity in the next 30 days: 0.78%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 79 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2001-1355
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2001-1355
Products affected by CVE-2001-1355
- cpe:2.3:a:netwin:dmail:2.5d:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:dmail:2.7:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:dmail:2.8f:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:dmail:2.8g:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:dmail:2.7q:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:dmail:2.8e:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:dmail:2.8h:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:dmail:2.7r:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:dmail:2.8i:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgeftp:1.0b:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgeftp:2.0a:*:*:*:*:*:*:*
- cpe:2.3:a:netwin:surgeftp:2.0b:*:*:*:*:*:*:*