
CVE-2008-6967
https://notcve.org/view.php?id=CVE-2008-6967
13 Aug 2009 — Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893. Múltiples vulnerabilidad no especificada en WorldClient en Alt-N MDaemon anteriores a v10.02 tienen impacto desconocido y vector de ataque, probablemente relativo a de ejecución de secuencias de comandos en sitios cruzados - XSS - WorldClient DLL v10.0.1, una vulnerabi... • http://files.altn.com/MDaemon/Release/RelNotes_en.txt •

CVE-2008-6893
https://notcve.org/view.php?id=CVE-2008-6893
03 Aug 2009 — Cross-site scripting (XSS) vulnerability in Alt-N MDaemon WorldClient 10.0.2, when Internet Explorer 7 is used, allows remote attackers to inject arbitrary web script or HTML via a crafted img tag. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Alt-N MDaemon WorldClient v10.0.2, al utilizar Internet Explorer 7, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante una etiqueta "img" modificada. • http://files.altn.com/MDaemon/Release/RelNotes_en.txt • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2008-4193 – Alt-N SecurityGateway 1.0.1 - 'Username' Remote Buffer Overflow (PoC)
https://notcve.org/view.php?id=CVE-2008-4193
24 Sep 2008 — Stack-based buffer overflow in SecurityGateway.dll in Alt-N Technologies SecurityGateway 1.0.1 allows remote attackers to execute arbitrary code via a long username parameter. Desbordamiento de búfer basado en pila en SecurityGateway.dll de Alt-N Technologies SecurityGateway 1.0.1 permite a atacantes remotos ejecutar código de su elección mediante un parámetro username largo. • https://www.exploit-db.com/exploits/5718 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2007-3622
https://notcve.org/view.php?id=CVE-2007-3622
09 Jul 2007 — Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages. Vulnerabilidad no especificada en DomainPOP en Alt-N Technologies MDaemon anterior a 9.61 permite a atacantes remotos provocar denegación de servicio (caida) a través de mensajes malformados. • http://files.altn.com/MDaemon/Release/RelNotes_en.txt •

CVE-2006-5968
https://notcve.org/view.php?id=CVE-2006-5968
17 Nov 2006 — MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions. MDaemon 9.0.5, 9.0.6, 9.51, y 9.53, y posiblemente otras versiones, instalan la carpeta de la aplicación MDaemon con permisos no seguros ... • http://secunia.com/advisories/21554 •

CVE-2006-5709
https://notcve.org/view.php?id=CVE-2006-5709
04 Nov 2006 — Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a "JavaScript exploit." Vulnerabilidad no especificada en WorldClient de Alt-N Technologies MDaemon versiones anteriores a 9.50 tiene un impacto desconocido y vectores de ataque referidos a "JavaScript exploit." • http://files.altn.com/MDaemon/Release/RelNotes_en.txt •

CVE-2006-5708
https://notcve.org/view.php?id=CVE-2006-5708
04 Nov 2006 — Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks. Múltiples vulnerabildiades no especificas en MDaemon y WorldClient en Alt-N Technologies MDaemon anteriores a 9.50 permite a un atacante remoto provocar denegación de servicio (cosumo de memoria) a través de vectores no especificados resultado de filtros de memoria. • http://files.altn.com/MDaemon/Release/RelNotes_en.txt • CWE-400: Uncontrolled Resource Consumption •

CVE-2006-4620
https://notcve.org/view.php?id=CVE-2006-4620
07 Sep 2006 — The useredit_account.wdm module in Alt-N WebAdmin 3.2.5 running with MDaemon 9.0.6, and possibly earlier versions, allows remote authenticated domain administrators to gain privileges and obtain access to the system mail queue by modifying the mailbox of the MDaemon user account to use the mailbox of another account. El módulo useredit_account.wdm en Alt-N WebAdmin 3.2.5 que funciona con MDaemon 9.0.6, y posiblemente versiones anteriores, permite a un administrador de dominio remoto validado conseguir privi... • http://files.altn.com/WebAdmin/Release/RelNotes_en.txt •

CVE-2006-4370
https://notcve.org/view.php?id=CVE-2006-4370
26 Aug 2006 — Alt-N WebAdmin 3.2.3 and 3.2.4 running with MDaemon 9.0.5, and possibly earlier, allow remote authenticated domain administrators to change a global administrator's password and gain privileges via the userlist.wdm file. Alt-N WebAdmin 3.2.3 y 3.2.4 ejecutándose con MDaemon 9.0.5, y posiblemente anteriores, permite a administradores de dominio autenticados remotamente cambiar la contraseña de un administrador global y escalar privilegios mediante el archivo userlist.wdm. • http://files.altn.com/WebAdmin/Release/RelNotes_en.txt •

CVE-2006-4371
https://notcve.org/view.php?id=CVE-2006-4371
26 Aug 2006 — Multiple directory traversal vulnerabilities in Alt-N WebAdmin 3.2.3 and 3.2.4 running with MDaemon 9.0.5, and possibly earlier, allow remote authenticated global administrators to read arbitrary files via a .. (dot dot) in the file parameter to (1) logfile_view.wdm and (2) configfile_view.wdm. Múltiples vulnerabilidades de escalada de directorio en Alt-N WebAdmin 3.2.3 y 3.2.4 ejecutándose con MDaemon 9.0.5, y posiblemente anterioes, permite a administradores globales autenticados remotamente leer archivos... • http://files.altn.com/WebAdmin/Release/RelNotes_en.txt •