Page 6 of 28 results (0.002 seconds)

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user's email. • http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0008&L=ntbugtraq&F=&S=&P=459 http://www.securityfocus.com/bid/1553 https://exchange.xforce.ibmcloud.com/vulnerabilities/5070 •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 1

Race condition in MDaemon 2.8.5.0 POP server allows local users to cause a denial of service by entering a UIDL command and quickly exiting the server. • https://www.exploit-db.com/exploits/20020 http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0277.html http://www.securityfocus.com/bid/1366 https://exchange.xforce.ibmcloud.com/vulnerabilities/4745 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in MDaemon POP server allows remote attackers to cause a denial of service via a long user name. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0301.html http://www.securityfocus.com/bid/1250 •