Mdaemon
Sign in to watchby Alt N
CVEs (34)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2006-5709 | 0.00 | — | 0.00 | Nov 4, 2006 | Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a "JavaScript exploit." | ||
| CVE-2005-4266 | 0.00 | — | 0.01 | Dec 15, 2005 | WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value. | ||
| CVE-2004-2292 | 0.00 | — | 0.02 | Dec 31, 2004 | Buffer overflow in Alt-N MDaemon 7.0.1 allows remote attackers to cause a denial of service (application crash) via a long STATUS command to the IMAP server. | ||
| CVE-2004-2504 | 0.00 | — | 0.00 | Dec 31, 2004 | The GUI in Alt-N Technologies MDaemon 7.2 and earlier, including 6.8, executes child processes such as NOTEPAD.EXE with SYSTEM privileges when users create new files, which allows local users with physical access to gain privileges. | ||
| CVE-2003-1470 | 0.00 | — | 0.02 | Dec 31, 2003 | Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name. | ||
| CVE-2003-1471 | 0.00 | — | 0.01 | Dec 31, 2003 | MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number. | ||
| CVE-2002-1738 | 0.00 | — | 0.00 | Dec 31, 2002 | Alt-N Technologies MDaemon 5.0.5.0 and earlier creates a default MDaemon mail account with a password of MServer, which could allow remote attackers to send anonymous email. | ||
| CVE-2001-0583 | 0.00 | — | 0.01 | Aug 22, 2001 | Alt-N Technologies MDaemon 3.5.4 allows a remote attacker to create a denial of service via the URL request of a MS-DOS device (such as GET /aux) to (1) the Worldclient service at port 3000, or (2) the Webconfig service at port 3001. | ||
| CVE-2001-0064 | 0.00 | — | 0.01 | Feb 12, 2001 | Webconfig, IMAP, and other services in MDaemon 3.5.0 and earlier allows remote attackers to cause a denial of service via a long URL terminated by a "\r\n" string. | ||
| CVE-2001-0104 | 0.00 | — | 0.00 | Feb 12, 2001 | MDaemon Pro 3.5.1 and earlier allows local users to bypass the "lock server" security setting by pressing the Cancel button at the password prompt, then pressing the enter key. | ||
| CVE-2000-1020 | 0.00 | — | 0.01 | Dec 11, 2000 | Heap overflow in Worldclient in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL. | ||
| CVE-2000-0716 | 0.00 | — | 0.00 | Oct 20, 2000 | WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user's email. | ||
| CVE-2000-0399 | 0.00 | — | 0.01 | May 24, 2000 | Buffer overflow in MDaemon POP server allows remote attackers to cause a denial of service via a long user name. | ||
| CVE-1999-0846 | 0.00 | — | 0.01 | Dec 1, 1999 | Denial of service in MDaemon 2.7 via a large number of connection attempts. |
Page 2 of 2