Page 6 of 38 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

Alt-N Technologies MDaemon 5.0.5.0 and earlier creates a default MDaemon mail account with a password of MServer, which could allow remote attackers to send anonymous email. • http://online.securityfocus.com/archive/1/271374 http://www.securityfocus.com/bid/4685 https://exchange.xforce.ibmcloud.com/vulnerabilities/9024 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Alt-N Technologies Mdaemon 5.0 through 5.0.6 uses a weak encryption algorithm to store user passwords, which allows local users to crack passwords. • http://online.securityfocus.com/archive/1/271374 http://www.securityfocus.com/bid/4686 https://exchange.xforce.ibmcloud.com/vulnerabilities/9025 • CWE-326: Inadequate Encryption Strength •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Alt-N Technologies MDaemon 3.5.4 allows a remote attacker to create a denial of service via the URL request of a MS-DOS device (such as GET /aux) to (1) the Worldclient service at port 3000, or (2) the Webconfig service at port 3001. • http://archives.neohapsis.com/archives/bugtraq/2001-03/0188.html http://ftp1.deerfield.com/pub/mdaemon/Archive/3.5.6 https://exchange.xforce.ibmcloud.com/vulnerabilities/6240 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 3

IMAP server in Alt-N Technologies MDaemon 3.5.6 allows a local user to cause a denial of service (hang) via long (1) SELECT or (2) EXAMINE commands. • https://www.exploit-db.com/exploits/20696 http://archives.neohapsis.com/archives/bugtraq/2001-03/0365.html http://www.securityfocus.com/bid/2508 https://exchange.xforce.ibmcloud.com/vulnerabilities/6279 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

MDaemon Pro 3.5.1 and earlier allows local users to bypass the "lock server" security setting by pressing the Cancel button at the password prompt, then pressing the enter key. • http://www.securityfocus.com/archive/1/151156 http://www.securityfocus.com/bid/2115 https://exchange.xforce.ibmcloud.com/vulnerabilities/5763 •