Page 5 of 29 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

MDaemon Pro 3.5.1 and earlier allows local users to bypass the "lock server" security setting by pressing the Cancel button at the password prompt, then pressing the enter key. • http://www.securityfocus.com/archive/1/151156 http://www.securityfocus.com/bid/2115 https://exchange.xforce.ibmcloud.com/vulnerabilities/5763 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Webconfig, IMAP, and other services in MDaemon 3.5.0 and earlier allows remote attackers to cause a denial of service via a long URL terminated by a "\r\n" string. • http://archives.neohapsis.com/archives/bugtraq/2000-12/0315.html http://www.securityfocus.com/bid/2134 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 1

Heap overflow in WebConfig in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL. • https://www.exploit-db.com/exploits/20225 http://marc.info/?l=bugtraq&m=96925269716274&w=2 http://www.securityfocus.com/bid/1689 https://exchange.xforce.ibmcloud.com/vulnerabilities/5250 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Heap overflow in Worldclient in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL. • http://marc.info/?l=bugtraq&m=96925269716274&w=2 http://www.securityfocus.com/bid/1689 https://exchange.xforce.ibmcloud.com/vulnerabilities/5250 •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user's email. • http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0008&L=ntbugtraq&F=&S=&P=459 http://www.securityfocus.com/bid/1553 https://exchange.xforce.ibmcloud.com/vulnerabilities/5070 •