Page 7 of 38 results (0.006 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Webconfig, IMAP, and other services in MDaemon 3.5.0 and earlier allows remote attackers to cause a denial of service via a long URL terminated by a "\r\n" string. • http://archives.neohapsis.com/archives/bugtraq/2000-12/0315.html http://www.securityfocus.com/bid/2134 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 1

Heap overflow in WebConfig in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL. • https://www.exploit-db.com/exploits/20225 http://marc.info/?l=bugtraq&m=96925269716274&w=2 http://www.securityfocus.com/bid/1689 https://exchange.xforce.ibmcloud.com/vulnerabilities/5250 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Heap overflow in Worldclient in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL. • http://marc.info/?l=bugtraq&m=96925269716274&w=2 http://www.securityfocus.com/bid/1689 https://exchange.xforce.ibmcloud.com/vulnerabilities/5250 •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user's email. • http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0008&L=ntbugtraq&F=&S=&P=459 http://www.securityfocus.com/bid/1553 https://exchange.xforce.ibmcloud.com/vulnerabilities/5070 •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 1

Race condition in MDaemon 2.8.5.0 POP server allows local users to cause a denial of service by entering a UIDL command and quickly exiting the server. • https://www.exploit-db.com/exploits/20020 http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0277.html http://www.securityfocus.com/bid/1366 https://exchange.xforce.ibmcloud.com/vulnerabilities/4745 •