Filtered by vendor Alt-n
Subscriptions
Filtered by product Mdaemon
Subscriptions
Total
28 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2003-1200 | 1 Alt-n | 1 Mdaemon | 2025-04-03 | N/A |
| Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi. | ||||
| CVE-2000-0501 | 1 Alt-n | 1 Mdaemon | 2025-04-03 | N/A |
| Race condition in MDaemon 2.8.5.0 POP server allows local users to cause a denial of service by entering a UIDL command and quickly exiting the server. | ||||
| CVE-2000-0399 | 1 Alt-n | 1 Mdaemon | 2025-04-03 | N/A |
| Buffer overflow in MDaemon POP server allows remote attackers to cause a denial of service via a long user name. | ||||
| CVE-2005-4209 | 1 Alt-n | 2 Mdaemon, Worldclient | 2025-04-03 | N/A |
| WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability. | ||||
| CVE-2000-0716 | 1 Alt-n | 1 Mdaemon | 2025-04-03 | N/A |
| WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user's email. | ||||
| CVE-2001-0584 | 1 Alt-n | 1 Mdaemon | 2025-04-03 | N/A |
| IMAP server in Alt-N Technologies MDaemon 3.5.6 allows a local user to cause a denial of service (hang) via long (1) SELECT or (2) EXAMINE commands. | ||||
| CVE-2002-1740 | 1 Alt-n | 2 Mdaemon, Worldclient | 2025-04-03 | N/A |
| Buffer overflow in WorldClient.cgi in WorldClient in Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to execute arbitrary code via a long folder name (NewFolder parameter). | ||||
| CVE-2005-4266 | 1 Alt-n | 2 Mdaemon, Worldclient | 2025-04-03 | N/A |
| WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value. | ||||