Page 8 of 40 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Heap overflow in Worldclient in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL. • http://marc.info/?l=bugtraq&m=96925269716274&w=2 http://www.securityfocus.com/bid/1689 https://exchange.xforce.ibmcloud.com/vulnerabilities/5250 •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user's email. • http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0008&L=ntbugtraq&F=&S=&P=459 http://www.securityfocus.com/bid/1553 https://exchange.xforce.ibmcloud.com/vulnerabilities/5070 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 3

The WDaemon web server for WorldClient 2.1 allows remote attackers to read arbitrary files via a .. (dot dot) attack. • https://www.exploit-db.com/exploits/20070 http://archives.neohapsis.com/archives/bugtraq/2000-07/0173.html http://www.altn.com/Downloads/WorldClient/Release/RelNotes.txt http://www.osvdb.org/1459 http://www.securityfocus.com/bid/1462 https://exchange.xforce.ibmcloud.com/vulnerabilities/4913 •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 1

Race condition in MDaemon 2.8.5.0 POP server allows local users to cause a denial of service by entering a UIDL command and quickly exiting the server. • https://www.exploit-db.com/exploits/20020 http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0277.html http://www.securityfocus.com/bid/1366 https://exchange.xforce.ibmcloud.com/vulnerabilities/4745 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in MDaemon POP server allows remote attackers to cause a denial of service via a long user name. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0301.html http://www.securityfocus.com/bid/1250 •