{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T20:39:18.121","vulnerabilities":[{"cve":{"id":"CVE-2007-2655","sourceIdentifier":"cve@mitre.org","published":"2007-05-14T21:19:00.000","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in NetWin Webmail 3.1s-1 in SurgeMail before 3.8i2 has unknown impact and remote attack vectors, possibly a format string vulnerability that allows remote code execution."},{"lang":"es","value":"Una vulnerabilidad no especificada en NetWin Webmail versión 3.1s-1 en SurgeMail versiones anteriores a 3.8i2, presenta un impacto desconocido y vectores de ataque remoto, posiblemente una vulnerabilidad de cadena de formato que permite la ejecución de código remota."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-134"},{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netwin:surgemail:3.8f3:*:*:*:*:*:*:*","matchCriteriaId":"50C06B4F-1DEC-4622-B060-184762418112"},{"vulnerable":true,"criteria":"cpe:2.3:a:netwin:surgemail:3.8i:*:*:*:*:*:*:*","matchCriteriaId":"19390313-1B1C-4388-AA3B-1A470416FADF"},{"vulnerable":true,"criteria":"cpe:2.3:a:netwin:surgemail:3.8i2:*:*:*:*:*:*:*","matchCriteriaId":"EB1FD0B1-DEE5-4765-9538-FBA20E8B1559"},{"vulnerable":true,"criteria":"cpe:2.3:a:netwin:webmail:3.1s1:*:*:*:*:*:*:*","matchCriteriaId":"383F78AD-F1F6-412E-B035-3E7D8EDD2FFB"},{"vulnerable":true,"criteria":"cpe:2.3:a:netwin:webmail:3.1s13:*:*:*:*:*:*:*","matchCriteriaId":"3E73FA79-D0DF-4026-97B5-82246F7630DC"}]}]}],"references":[{"url":"http://osvdb.org/35891","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/25207","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.netwinsite.com/surgemail/help/updates.htm","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/23908","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.vupen.com/english/advisories/2007/1755","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34217","source":"cve@mitre.org"},{"url":"http://osvdb.org/35891","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/25207","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.netwinsite.com/surgemail/help/updates.htm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/23908","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.vupen.com/english/advisories/2007/1755","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34217","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"The vendor has addressed this issue through a product update: \r\nhttp://netwinsite.com/cgi-bin/keycgi.exe?cmd=download&product=surgemail"}}]}