Page 2 of 11 results (0.004 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in MDaemon before 20.0.4. There is Reflected XSS in Webmail (aka WorldClient). It can be exploited via a GET request. It allows performing any action with the privileges of the attacked user. Se detectó un problema en MDaemon versiones anteriores a 20.0.4. • https://github.com/chudyPB/MDaemon-Advisories https://www.altn.com/Support/SecurityUpdate/MD011221_MDaemon_EN • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 60EXPL: 0

Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893. Múltiples vulnerabilidad no especificada en WorldClient en Alt-N MDaemon anteriores a v10.02 tienen impacto desconocido y vector de ataque, probablemente relativo a de ejecución de secuencias de comandos en sitios cruzados - XSS - WorldClient DLL v10.0.1, una vulnerabilidad diferente que CVE-2008-6893. • http://files.altn.com/MDaemon/Release/RelNotes_en.txt http://osvdb.org/50011 http://secunia.com/advisories/32142 http://www.securityfocus.com/bid/32355 http://www.vupen.com/english/advisories/2008/3206 https://exchange.xforce.ibmcloud.com/vulnerabilities/46688 •

CVSS: 5.0EPSS: 81%CPEs: 1EXPL: 1

The WordClient interface in Alt-N Technologies MDaemon 9.6.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted HTTP POST request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. La interfaz WordClient en Alt-N Technologies MDaemon 9.6.5 permite a atacantes remotos provocar una denegación de servicio (puntero a referencia NULL o caída de aplicación) a través de una petición HTTP POST manipulada. NOTA: la procedencia de esta información es desconocida; los detalles han sido obtenidos solamente a partir de la información de terceros. • https://www.exploit-db.com/exploits/5727 http://secunia.com/advisories/30474 https://exchange.xforce.ibmcloud.com/vulnerabilities/42809 • CWE-399: Resource Management Errors •

CVSS: 2.6EPSS: 2%CPEs: 1EXPL: 0

Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages. Vulnerabilidad no especificada en DomainPOP en Alt-N Technologies MDaemon anterior a 9.61 permite a atacantes remotos provocar denegación de servicio (caida) a través de mensajes malformados. • http://files.altn.com/MDaemon/Release/RelNotes_en.txt http://osvdb.org/37193 http://secunia.com/advisories/25968 http://www.securityfocus.com/bid/24787 http://www.securitytracker.com/id?1018342 https://exchange.xforce.ibmcloud.com/vulnerabilities/35285 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions. MDaemon 9.0.5, 9.0.6, 9.51, y 9.53, y posiblemente otras versiones, instalan la carpeta de la aplicación MDaemon con permisos no seguros (los usuarios crean ficheros/directorios), lo cual permite a un usuario local ejecutar código de su elección a través de la creacion de código malicioso de las librerias RASAPI32.DLL o MPRAPI.DLL en la carpeta MDaemon\APP, lo cual no es una carpeta de búsqueda correcta debido a lo permisos poco seguros. • http://secunia.com/advisories/21554 http://secunia.com/secunia_research/2006-67/advisory http://securityreason.com/securityalert/1890 http://securitytracker.com/id?1017238 http://www.securityfocus.com/archive/1/451821/100/100/threaded http://www.vupen.com/english/advisories/2006/4538 https://exchange.xforce.ibmcloud.com/vulnerabilities/30331 •