CVE-2008-6967
https://notcve.org/view.php?id=CVE-2008-6967
Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893. Múltiples vulnerabilidad no especificada en WorldClient en Alt-N MDaemon anteriores a v10.02 tienen impacto desconocido y vector de ataque, probablemente relativo a de ejecución de secuencias de comandos en sitios cruzados - XSS - WorldClient DLL v10.0.1, una vulnerabilidad diferente que CVE-2008-6893. • http://files.altn.com/MDaemon/Release/RelNotes_en.txt http://osvdb.org/50011 http://secunia.com/advisories/32142 http://www.securityfocus.com/bid/32355 http://www.vupen.com/english/advisories/2008/3206 https://exchange.xforce.ibmcloud.com/vulnerabilities/46688 •
CVE-2008-6893
https://notcve.org/view.php?id=CVE-2008-6893
Cross-site scripting (XSS) vulnerability in Alt-N MDaemon WorldClient 10.0.2, when Internet Explorer 7 is used, allows remote attackers to inject arbitrary web script or HTML via a crafted img tag. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Alt-N MDaemon WorldClient v10.0.2, al utilizar Internet Explorer 7, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante una etiqueta "img" modificada. • http://files.altn.com/MDaemon/Release/RelNotes_en.txt http://osvdb.org/50648 http://secunia.com/advisories/32885 http://www.securityfocus.com/bid/32776 https://exchange.xforce.ibmcloud.com/vulnerabilities/47209 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2008-4193 – Alt-N SecurityGateway 1.0.1 - 'Username' Remote Buffer Overflow (PoC)
https://notcve.org/view.php?id=CVE-2008-4193
Stack-based buffer overflow in SecurityGateway.dll in Alt-N Technologies SecurityGateway 1.0.1 allows remote attackers to execute arbitrary code via a long username parameter. Desbordamiento de búfer basado en pila en SecurityGateway.dll de Alt-N Technologies SecurityGateway 1.0.1 permite a atacantes remotos ejecutar código de su elección mediante un parámetro username largo. • https://www.exploit-db.com/exploits/5718 https://www.exploit-db.com/exploits/16803 https://www.exploit-db.com/exploits/5827 http://files.altn.com/securitygateway/release/relnotes_en.htm http://secunia.com/advisories/30497 http://securityreason.com/securityalert/4302 http://www.securityfocus.com/bid/29457 http://www.securitytracker.com/id?1020156 http://www.vupen.com/english/advisories/2008/1717/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42769 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-3622
https://notcve.org/view.php?id=CVE-2007-3622
Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages. Vulnerabilidad no especificada en DomainPOP en Alt-N Technologies MDaemon anterior a 9.61 permite a atacantes remotos provocar denegación de servicio (caida) a través de mensajes malformados. • http://files.altn.com/MDaemon/Release/RelNotes_en.txt http://osvdb.org/37193 http://secunia.com/advisories/25968 http://www.securityfocus.com/bid/24787 http://www.securitytracker.com/id?1018342 https://exchange.xforce.ibmcloud.com/vulnerabilities/35285 •
CVE-2006-5968
https://notcve.org/view.php?id=CVE-2006-5968
MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions. MDaemon 9.0.5, 9.0.6, 9.51, y 9.53, y posiblemente otras versiones, instalan la carpeta de la aplicación MDaemon con permisos no seguros (los usuarios crean ficheros/directorios), lo cual permite a un usuario local ejecutar código de su elección a través de la creacion de código malicioso de las librerias RASAPI32.DLL o MPRAPI.DLL en la carpeta MDaemon\APP, lo cual no es una carpeta de búsqueda correcta debido a lo permisos poco seguros. • http://secunia.com/advisories/21554 http://secunia.com/secunia_research/2006-67/advisory http://securityreason.com/securityalert/1890 http://securitytracker.com/id?1017238 http://www.securityfocus.com/archive/1/451821/100/100/threaded http://www.vupen.com/english/advisories/2006/4538 https://exchange.xforce.ibmcloud.com/vulnerabilities/30331 •