
CVE-2022-29976
https://notcve.org/view.php?id=CVE-2022-29976
11 May 2022 — An Authenticated Reflected Cross-site scripting at BCC Parameter was discovered in MDaemon before 22.0.0 . Se ha detectado una vulnerabilidad de tipo Cross-site scripting Reflejado y Autenticado en el parámetro BCC en MDaemon versiones anteriores a 22.0.0 • https://github.com/haxpunk1337/MDaemon-/blob/main/MDaemon%20XSS%20at%20BCC%20endpoint • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-29975
https://notcve.org/view.php?id=CVE-2022-29975
11 May 2022 — An Authenticated Reflected Cross-site scripting at CC Parameter was discovered in MDaemon before 22.0.0 . Se ha detectado una vulnerabilidad de tipo Cross-site scriptin Reflejado y Autenticado en el parámetro CC en MDaemon versiones anteriores a 22.0.0 • https://github.com/haxpunk1337/MDaemon-/blob/main/MDaemon%20XSS%20at%20CC%20endpoint • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-27183
https://notcve.org/view.php?id=CVE-2021-27183
14 Apr 2021 — An issue was discovered in MDaemon before 20.0.4. Administrators can use Remote Administration to exploit an Arbitrary File Write vulnerability. An attacker is able to create new files in any location of the filesystem, or he may be able to modify existing files. This vulnerability may directly lead to Remote Code Execution. Se detectó un problema en MDaemon versiones anteriores a 20.0.4. • https://github.com/chudyPB/MDaemon-Advisories • CWE-610: Externally Controlled Reference to a Resource in Another Sphere •

CVE-2021-27182
https://notcve.org/view.php?id=CVE-2021-27182
14 Apr 2021 — An issue was discovered in MDaemon before 20.0.4. There is an IFRAME injection vulnerability in Webmail (aka WorldClient). It can be exploited via an email message. It allows an attacker to perform any action with the privileges of the attacked user. Se detectó un problema en MDaemon versiones anteriores a 20.0.4. • https://github.com/chudyPB/MDaemon-Advisories • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2021-27181
https://notcve.org/view.php?id=CVE-2021-27181
14 Apr 2021 — An issue was discovered in MDaemon before 20.0.4. Remote Administration allows an attacker to perform a fixation of the anti-CSRF token. In order to exploit this issue, the user has to click on a malicious URL provided by the attacker and successfully authenticate into the application. Having the value of the anti-CSRF token, the attacker may trick the user into visiting his malicious page and performing any request with the privileges of attacked user. Se detectó un problema en MDaemon versiones anteriores... • https://github.com/chudyPB/MDaemon-Advisories • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2021-27180
https://notcve.org/view.php?id=CVE-2021-27180
14 Apr 2021 — An issue was discovered in MDaemon before 20.0.4. There is Reflected XSS in Webmail (aka WorldClient). It can be exploited via a GET request. It allows performing any action with the privileges of the attacked user. Se detectó un problema en MDaemon versiones anteriores a 20.0.4. • https://github.com/chudyPB/MDaemon-Advisories • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-18724 – Alt-N MDaemon webmail 20.0.0 - 'Contact name' Stored Cross Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2020-18724
03 Feb 2021 — Authenticated stored cross-site scripting (XSS) in the contact name field in the distribution list of MDaemon webmail 19.5.5 allows an attacker to executes code and perform a XSS attack while opening a contact list. Una vulnerabilidad de tipo cross-site scripting (XSS) almacenado y autenticado en el campo contact name en la lista de distribución de MDaemon webmail versión 19.5.5, permiten a un atacante ejecutar código y llevar a cabo un ataque de tipo XSS mientras abre una lista de contactos Alt-N MDaemon w... • https://packetstorm.news/files/id/161332 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-18723 – Alt-N MDaemon webmail 20.0.0 - 'file name' Stored Cross Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2020-18723
03 Feb 2021 — Stored cross-site scripting (XSS) in file attachment field in MDaemon webmail 19.5.5 allows an attacker to execute code on the email recipient side while forwarding an email to perform potentially malicious activities. Una vulnerabilidad de tipo cross-site scripting (XSS) almacenado en el campo file attachment en MDaemon webmail versión 19.5.5, permiten a un atacante ejecutar código en el lado del destinatario del correo electrónico mientras reenvía un correo electrónico para llevar a cabo actividades poten... • https://packetstorm.news/files/id/161332 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-19497
https://notcve.org/view.php?id=CVE-2019-19497
17 Dec 2019 — MDaemon Email Server 17.5.1 allows XSS via the filename of an attachment to an email message. MDaemon Email Server versión 17.5.1, permite un ataque de tipo XSS por medio del nombre de archivo de un archivo adjunto a un mensaje de correo electrónico. • https://github.com/Dmitriy-area51/Exploit/blob/master/CVE-2019-19497/README.md • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-13612
https://notcve.org/view.php?id=CVE-2019-13612
16 Jul 2019 — MDaemon Email Server 19 through 20.0.1 skips SpamAssassin checks by default for e-mail messages larger than 2 MB (and limits checks to 10 MB even with special configuration), which is arguably inconsistent with currently popular message sizes. This might interfere with risk management for malicious e-mail, if a customer deploys a server with sufficient resources to scan large messages. MDaemon Email Server versión 19 hasta la versión 20.0.1 omite las comprobaciones de SpamAssassin por defecto para los mensa... • http://lists.altn.com/WebX/.59862f3c • CWE-20: Improper Input Validation •