
CVE-2008-2631 – Alt-N MDaemon 9.6.5 - Multiple Remote Buffer Overflows (PoC)
https://notcve.org/view.php?id=CVE-2008-2631
10 Jun 2008 — The WordClient interface in Alt-N Technologies MDaemon 9.6.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted HTTP POST request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. La interfaz WordClient en Alt-N Technologies MDaemon 9.6.5 permite a atacantes remotos provocar una denegación de servicio (puntero a referencia NULL o caída de aplicación) a través de una petición HTT... • https://www.exploit-db.com/exploits/5727 • CWE-399: Resource Management Errors •

CVE-2008-1358 – MDaemon 9.6.4 IMAPD FETCH Buffer Overflow
https://notcve.org/view.php?id=CVE-2008-1358
17 Mar 2008 — Stack-based buffer overflow in the IMAP server in Alt-N Technologies MDaemon 9.6.4 allows remote authenticated users to execute arbitrary code via a FETCH command with a long BODY. Un desbordamiento de búfer en la región stack de la memoria en el servidor IMAP en Alt-N Technologies MDaemon versión 9.6.4, permite a los usuarios autenticados remotos ejecutar código arbitrario por medio de un comando FETCH con un CUERPO largo. • https://packetstorm.news/files/id/83208 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2007-3622
https://notcve.org/view.php?id=CVE-2007-3622
09 Jul 2007 — Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages. Vulnerabilidad no especificada en DomainPOP en Alt-N Technologies MDaemon anterior a 9.61 permite a atacantes remotos provocar denegación de servicio (caida) a través de mensajes malformados. • http://files.altn.com/MDaemon/Release/RelNotes_en.txt •

CVE-2006-5968
https://notcve.org/view.php?id=CVE-2006-5968
17 Nov 2006 — MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions. MDaemon 9.0.5, 9.0.6, 9.51, y 9.53, y posiblemente otras versiones, instalan la carpeta de la aplicación MDaemon con permisos no seguros ... • http://secunia.com/advisories/21554 •

CVE-2006-5708
https://notcve.org/view.php?id=CVE-2006-5708
04 Nov 2006 — Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks. Múltiples vulnerabildiades no especificas en MDaemon y WorldClient en Alt-N Technologies MDaemon anteriores a 9.50 permite a un atacante remoto provocar denegación de servicio (cosumo de memoria) a través de vectores no especificados resultado de filtros de memoria. • http://files.altn.com/MDaemon/Release/RelNotes_en.txt • CWE-400: Uncontrolled Resource Consumption •

CVE-2006-4364 – Alt-N MDaemon POP3 Server < 9.06 - 'USER' Remote Heap Overflow
https://notcve.org/view.php?id=CVE-2006-4364
25 Aug 2006 — Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands. Múltiples desbordamientos de búfer en el servidor POP3 de Alt-N Technologies MDaemon anterior a 9.0.6 permiten a atacantes remotos provocar una denegación de servicio (caída del demonio) y posiblemente ejecutar código de su el... • https://www.exploit-db.com/exploits/2258 •

CVE-2006-2646 – Alt-N MDaemon 2-8 - IMAP Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2006-2646
30 May 2006 — Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a '"' (double quote). Desbordamiento de búfer en Alt-N MDaemon, posiblemente 9.0.1 y versiones anteriores, permite a atacantes remotos ejecutar código arbitrario a través de un argumento A0001 largo que comienza con un '"' (comillas dobles). • https://www.exploit-db.com/exploits/27914 •

CVE-2006-0925 – Alt-N MDaemon 8.1.1 IMAP Server - Remote Format String
https://notcve.org/view.php?id=CVE-2006-0925
28 Feb 2006 — Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers. • https://www.exploit-db.com/exploits/27329 •

CVE-2005-4266
https://notcve.org/view.php?id=CVE-2005-4266
15 Dec 2005 — WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value. • http://secunia.com/advisories/17990 •

CVE-2005-4209 – Alt-N MDaemon WorldClient 8.1.3 - Denial of Service
https://notcve.org/view.php?id=CVE-2005-4209
13 Dec 2005 — WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability. • https://www.exploit-db.com/exploits/26779 • CWE-94: Improper Control of Generation of Code ('Code Injection') •