Page 2 of 40 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a "JavaScript exploit." Vulnerabilidad no especificada en WorldClient de Alt-N Technologies MDaemon versiones anteriores a 9.50 tiene un impacto desconocido y vectores de ataque referidos a "JavaScript exploit." • http://files.altn.com/MDaemon/Release/RelNotes_en.txt http://secunia.com/advisories/22507 http://www.vupen.com/english/advisories/2006/4251 •

CVSS: 5.0EPSS: 0%CPEs: 48EXPL: 0

Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks. Múltiples vulnerabildiades no especificas en MDaemon y WorldClient en Alt-N Technologies MDaemon anteriores a 9.50 permite a un atacante remoto provocar denegación de servicio (cosumo de memoria) a través de vectores no especificados resultado de filtros de memoria. • http://files.altn.com/MDaemon/Release/RelNotes_en.txt •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

The useredit_account.wdm module in Alt-N WebAdmin 3.2.5 running with MDaemon 9.0.6, and possibly earlier versions, allows remote authenticated domain administrators to gain privileges and obtain access to the system mail queue by modifying the mailbox of the MDaemon user account to use the mailbox of another account. El módulo useredit_account.wdm en Alt-N WebAdmin 3.2.5 que funciona con MDaemon 9.0.6, y posiblemente versiones anteriores, permite a un administrador de dominio remoto validado conseguir privilegios y obtener acceso a la cola del sistema de correo a través de la modificación de la bandeja de entrada de la cuenta de usuario de MDaemon para usar la bandeja de entrada de otra cuenta de usuario. • http://files.altn.com/WebAdmin/Release/RelNotes_en.txt http://secunia.com/advisories/21727 http://securityreason.com/securityalert/1516 http://www.osvdb.org/28548 http://www.securityfocus.com/archive/1/445153/100/0/threaded http://www.teklow.com/advisories/TTG0602.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/28776 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

Alt-N WebAdmin 3.2.3 and 3.2.4 running with MDaemon 9.0.5, and possibly earlier, allow remote authenticated domain administrators to change a global administrator's password and gain privileges via the userlist.wdm file. Alt-N WebAdmin 3.2.3 y 3.2.4 ejecutándose con MDaemon 9.0.5, y posiblemente anteriores, permite a administradores de dominio autenticados remotamente cambiar la contraseña de un administrador global y escalar privilegios mediante el archivo userlist.wdm. • http://files.altn.com/WebAdmin/Release/RelNotes_en.txt http://lists.grok.org.uk/pipermail/full-disclosure/2006-August/048959.html http://secunia.com/advisories/21558 http://securityreason.com/securityalert/1455 http://www.securityfocus.com/archive/1/444012/100/0/threaded http://www.securityfocus.com/bid/19631 http://www.vupen.com/english/advisories/2006/3333 https://exchange.xforce.ibmcloud.com/vulnerabilities/28489 •

CVSS: 4.0EPSS: 0%CPEs: 2EXPL: 0

Multiple directory traversal vulnerabilities in Alt-N WebAdmin 3.2.3 and 3.2.4 running with MDaemon 9.0.5, and possibly earlier, allow remote authenticated global administrators to read arbitrary files via a .. (dot dot) in the file parameter to (1) logfile_view.wdm and (2) configfile_view.wdm. Múltiples vulnerabilidades de escalada de directorio en Alt-N WebAdmin 3.2.3 y 3.2.4 ejecutándose con MDaemon 9.0.5, y posiblemente anterioes, permite a administradores globales autenticados remotamente leer archivos de su elección mediante un .. (punto punto) en el parámetro file de (1) logfile_view.wdm y (2) configfile_view.wdm. • http://files.altn.com/WebAdmin/Release/RelNotes_en.txt http://lists.grok.org.uk/pipermail/full-disclosure/2006-August/048959.html http://secunia.com/advisories/21558 http://securityreason.com/securityalert/1455 http://www.osvdb.org/28122 http://www.osvdb.org/28123 http://www.securityfocus.com/archive/1/444012/100/0/threaded http://www.securityfocus.com/bid/19620 http://www.vupen.com/english/advisories/2006/3333 https://exchange.xforce.ibmcloud.com/vulnerabilities/28488 •