Page 2 of 40 results (0.004 seconds)

CVSS: 9.8EPSS: 68%CPEs: 47EXPL: 4

25 Aug 2006 — Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands. Múltiples desbordamientos de búfer en el servidor POP3 de Alt-N Technologies MDaemon anterior a 9.0.6 permiten a atacantes remotos provocar una denegación de servicio (caída del demonio) y posiblemente ejecutar código de su el... • https://www.exploit-db.com/exploits/2245 •

CVSS: 9.8EPSS: 5%CPEs: 42EXPL: 3

30 May 2006 — Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a '"' (double quote). Desbordamiento de búfer en Alt-N MDaemon, posiblemente 9.0.1 y versiones anteriores, permite a atacantes remotos ejecutar código arbitrario a través de un argumento A0001 largo que comienza con un '"' (comillas dobles). • https://www.exploit-db.com/exploits/27914 •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 1

28 Feb 2006 — Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers. • https://www.exploit-db.com/exploits/27329 •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

15 Dec 2005 — WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value. • http://secunia.com/advisories/17990 •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 3

13 Dec 2005 — WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability. • https://www.exploit-db.com/exploits/26779 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

28 Jan 2005 — Cross-site scripting (XSS) vulnerability in useredit_account.wdm in Alt-N WebAdmin 3.0.4 allows remote attackers to inject arbitrary web script or HTML via the user parameter. • http://marc.info/?l=bugtraq&m=110692897003614&w=2 •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

28 Jan 2005 — useredit_account.wdm in Alt-N WebAdmin 3.0.4 does not properly validate account edits by the logged in user, which allows remote authenticated users to edit other users' account information via a modified user parameter. • http://marc.info/?l=bugtraq&m=110692897003614&w=2 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

28 Jan 2005 — Direct remote injection vulnerability in modalfram.wdm in Alt-N WebAdmin 3.0.4 allows remote attackers to load external webpages that appear to come from the WebAdmin server, which allows remote attackers to inject arbitrary HTML or web script to facilitate cross-site scripting (XSS) and phishing attacks. • http://marc.info/?l=bugtraq&m=110692897003614&w=2 •

CVSS: 7.5EPSS: 49%CPEs: 1EXPL: 4

31 Dec 2004 — Multiple buffer overflows in MDaemon 6.5.1 allow remote attackers to cause a denial of service (application crash) via a long (1) SAML, SOML, SEND, or MAIL command to the SMTP server or (2) LIST command to the IMAP server. • https://www.exploit-db.com/exploits/473 •

CVSS: 7.5EPSS: 1%CPEs: 27EXPL: 2

31 Dec 2004 — Buffer overflow in Alt-N MDaemon 7.0.1 allows remote attackers to cause a denial of service (application crash) via a long STATUS command to the IMAP server. • http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0527.html •