7 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 60EXPL: 0

Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893. Múltiples vulnerabilidad no especificada en WorldClient en Alt-N MDaemon anteriores a v10.02 tienen impacto desconocido y vector de ataque, probablemente relativo a de ejecución de secuencias de comandos en sitios cruzados - XSS - WorldClient DLL v10.0.1, una vulnerabilidad diferente que CVE-2008-6893. • http://files.altn.com/MDaemon/Release/RelNotes_en.txt http://osvdb.org/50011 http://secunia.com/advisories/32142 http://www.securityfocus.com/bid/32355 http://www.vupen.com/english/advisories/2008/3206 https://exchange.xforce.ibmcloud.com/vulnerabilities/46688 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in Alt-N MDaemon WorldClient 10.0.2, when Internet Explorer 7 is used, allows remote attackers to inject arbitrary web script or HTML via a crafted img tag. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Alt-N MDaemon WorldClient v10.0.2, al utilizar Internet Explorer 7, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante una etiqueta "img" modificada. • http://files.altn.com/MDaemon/Release/RelNotes_en.txt http://osvdb.org/50648 http://secunia.com/advisories/32885 http://www.securityfocus.com/bid/32776 https://exchange.xforce.ibmcloud.com/vulnerabilities/47209 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value. • http://secunia.com/advisories/17990 http://www.ipomonis.com/advisories/mdaemon.zip •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 3

WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability. • https://www.exploit-db.com/exploits/26779 http://secunia.com/advisories/17990 http://www.ipomonis.com/advisories/mdaemon.zip http://www.securityfocus.com/bid/15815 https://exchange.xforce.ibmcloud.com/vulnerabilities/23551 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 2

Buffer overflow in WorldClient.cgi in WorldClient in Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to execute arbitrary code via a long folder name (NewFolder parameter). • https://www.exploit-db.com/exploits/21439 http://online.securityfocus.com/archive/1/271374 http://www.securityfocus.com/bid/4689 https://exchange.xforce.ibmcloud.com/vulnerabilities/9026 •