Page 5 of 38 results (0.002 seconds)

CVSS: 6.3EPSS: 4%CPEs: 1EXPL: 0

MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number. • http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html http://www.securityfocus.com/bid/7445 https://exchange.xforce.ibmcloud.com/vulnerabilities/11882 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 1%CPEs: 1EXPL: 1

Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name. • http://securityreason.com/securityalert/3296 http://www.securityfocus.com/archive/1/319879 http://www.securityfocus.com/bid/7446 https://exchange.xforce.ibmcloud.com/vulnerabilities/11896 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 96%CPEs: 9EXPL: 6

Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi. • https://www.exploit-db.com/exploits/23501 https://www.exploit-db.com/exploits/16812 https://www.exploit-db.com/exploits/23502 http://hat-squad.com/bugreport/mdaemon-raw.txt http://marc.info/?l=bugtraq&m=107936753929354&w=2 http://secunia.com/advisories/10512 http://www.osvdb.org/3255 http://www.securityfocus.com/archive/1/348454 http://www.securityfocus.com/bid/9317 https://exchange.xforce.ibmcloud.com/vulnerabilities/14097 •

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 3

Buffer overflow in MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service via long (1) DELE or (2) UIDL arguments. Desbordamiento de búfer en MDaemon POP server 6.0.7 y anteriores, permite a usuarios remotos autentificados causar la Denegación de Servicios (DoS) mediante argumentos DELE o UIDL largos. • https://www.exploit-db.com/exploits/21965 http://archives.neohapsis.com/archives/bugtraq/2002-10/0382.html http://www.iss.net/security_center/static/10488.php http://www.securityfocus.com/bid/6053 •

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 2

Buffer overflow in WorldClient.cgi in WorldClient in Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to execute arbitrary code via a long folder name (NewFolder parameter). • https://www.exploit-db.com/exploits/21439 http://online.securityfocus.com/archive/1/271374 http://www.securityfocus.com/bid/4689 https://exchange.xforce.ibmcloud.com/vulnerabilities/9026 •