Page 4 of 28 results (0.002 seconds)

CVSS: 7.5EPSS: 96%CPEs: 9EXPL: 6

Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi. • https://www.exploit-db.com/exploits/23501 https://www.exploit-db.com/exploits/16812 https://www.exploit-db.com/exploits/23502 http://hat-squad.com/bugreport/mdaemon-raw.txt http://marc.info/?l=bugtraq&m=107936753929354&w=2 http://secunia.com/advisories/10512 http://www.osvdb.org/3255 http://www.securityfocus.com/archive/1/348454 http://www.securityfocus.com/bid/9317 https://exchange.xforce.ibmcloud.com/vulnerabilities/14097 •

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 3

Buffer overflow in MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service via long (1) DELE or (2) UIDL arguments. Desbordamiento de búfer en MDaemon POP server 6.0.7 y anteriores, permite a usuarios remotos autentificados causar la Denegación de Servicios (DoS) mediante argumentos DELE o UIDL largos. • https://www.exploit-db.com/exploits/21965 http://archives.neohapsis.com/archives/bugtraq/2002-10/0382.html http://www.iss.net/security_center/static/10488.php http://www.securityfocus.com/bid/6053 •

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 2

Buffer overflow in WorldClient.cgi in WorldClient in Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to execute arbitrary code via a long folder name (NewFolder parameter). • https://www.exploit-db.com/exploits/21439 http://online.securityfocus.com/archive/1/271374 http://www.securityfocus.com/bid/4689 https://exchange.xforce.ibmcloud.com/vulnerabilities/9026 •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

Alt-N Technologies MDaemon 5.0.5.0 and earlier creates a default MDaemon mail account with a password of MServer, which could allow remote attackers to send anonymous email. • http://online.securityfocus.com/archive/1/271374 http://www.securityfocus.com/bid/4685 https://exchange.xforce.ibmcloud.com/vulnerabilities/9024 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Alt-N Technologies MDaemon 3.5.4 allows a remote attacker to create a denial of service via the URL request of a MS-DOS device (such as GET /aux) to (1) the Worldclient service at port 3000, or (2) the Webconfig service at port 3001. • http://archives.neohapsis.com/archives/bugtraq/2001-03/0188.html http://ftp1.deerfield.com/pub/mdaemon/Archive/3.5.6 https://exchange.xforce.ibmcloud.com/vulnerabilities/6240 •