All of our products are being developed in Delphi or C#. Although we use Log4Net with some of the components, they are safe to use, because the reported vulnerability applies to Log4J only.
None of our applications depend on Log4J or any other Java library and are thus not affected by this vulnerability.
This applies to all versions and editions of our applications (TreeSize, SpaceObServer, SpaceObServer WebAccess, HeavyLoad, SmartPOP2Exchange, Exchange Server Toolbox, SpamAssassin in a Box, SpamAssassin for Windows, SmartCallMonitor, SEPA-Transfer, ServerSentinel, and ShellBrowser). It is recommended to always use the latest available versions though to benefit from the latest patches, improvements, and features.
In the Windows command prompt, run the following command:
If the output contains the following error, perform the steps below:
With the SSL setting SmartPOP2Exchange version V8.9 supports SSL up to version V3.0 and TLS up to version V1.2. The exact encryption type and version is defined during the connection. If your provider offers only TLS V1.2, SmartPOP2Exchange uses this version.
With the TLS setting STARTTLS is always used automatically. After TLS V1.0 and V1.1 are no longer available TLS V1.2 is used.