Page 3 of 40 results (0.014 seconds)

CVSS: 5.0EPSS: 22%CPEs: 47EXPL: 4

Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands. Múltiples desbordamientos de búfer en el servidor POP3 de Alt-N Technologies MDaemon anterior a 9.0.6 permiten a atacantes remotos provocar una denegación de servicio (caída del demonio) y posiblemente ejecutar código de su elección mediante cadenas largas que contienen caracteres '@' en los comandos (1) USER y (2) APOP. • https://www.exploit-db.com/exploits/2245 https://www.exploit-db.com/exploits/2258 http://files.altn.com/MDaemon/Release/RelNotes_en.txt http://secunia.com/advisories/21595 http://securityreason.com/securityalert/1446 http://securitytracker.com/id?1016729 http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04 http://www.osvdb.org/28125 http://www.securityfocus.com/archive/1/444015/100/0/threaded http://www.securityfocus.com/bid/19651 http://www.vupen.com/ •

CVSS: 7.5EPSS: 2%CPEs: 42EXPL: 3

Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a '"' (double quote). Desbordamiento de búfer en Alt-N MDaemon, posiblemente 9.0.1 y versiones anteriores, permite a atacantes remotos ejecutar código arbitrario a través de un argumento A0001 largo que comienza con un '"' (comillas dobles). • https://www.exploit-db.com/exploits/27914 http://marc.info/?l=full-disclosure&m=114882270912151&w=2 http://securitytracker.com/id?1016167 http://www.securityfocus.com/bid/18129 •

CVSS: 5.0EPSS: 6%CPEs: 2EXPL: 1

Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers. • https://www.exploit-db.com/exploits/27329 http://secunia.com/advisories/18921 http://www.nsag.ru/vuln/888.html http://www.securityfocus.com/bid/16854 http://www.vupen.com/english/advisories/2006/0729 https://exchange.xforce.ibmcloud.com/vulnerabilities/24916 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value. • http://secunia.com/advisories/17990 http://www.ipomonis.com/advisories/mdaemon.zip •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 3

WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability. • https://www.exploit-db.com/exploits/26779 http://secunia.com/advisories/17990 http://www.ipomonis.com/advisories/mdaemon.zip http://www.securityfocus.com/bid/15815 https://exchange.xforce.ibmcloud.com/vulnerabilities/23551 • CWE-94: Improper Control of Generation of Code ('Code Injection') •