Page 8 of 41 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Heap overflow in Worldclient in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL. • http://marc.info/?l=bugtraq&m=96925269716274&w=2 http://www.securityfocus.com/bid/1689 https://exchange.xforce.ibmcloud.com/vulnerabilities/5250 •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user's email. • http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0008&L=ntbugtraq&F=&S=&P=459 http://www.securityfocus.com/bid/1553 https://exchange.xforce.ibmcloud.com/vulnerabilities/5070 •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 1

Race condition in MDaemon 2.8.5.0 POP server allows local users to cause a denial of service by entering a UIDL command and quickly exiting the server. • https://www.exploit-db.com/exploits/20020 http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0277.html http://www.securityfocus.com/bid/1366 https://exchange.xforce.ibmcloud.com/vulnerabilities/4745 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in MDaemon POP server allows remote attackers to cause a denial of service via a long user name. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0301.html http://www.securityfocus.com/bid/1250 •

CVSS: 5.0EPSS: 4%CPEs: 2EXPL: 0

Denial of service in MDaemon 2.7 via a large number of connection attempts. • https://marc.info/?l=bugtraq&m=94398020817351&w=2 •