Vulnerabilites related to alt-n - mdaemon
CVE-2007-3622 (GCVE-0-2007-3622)
Vulnerability from cvelistv5
Published
2007-07-09 16:00
Modified
2024-08-07 14:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/37193 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/25968 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1018342 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/24787 | vdb-entry, x_refsource_BID | |
http://files.altn.com/MDaemon/Release/RelNotes_en.txt | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35285 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:21:36.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37193", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/37193" }, { "name": "25968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25968" }, { "name": "1018342", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018342" }, { "name": "24787", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24787" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "name": "mdaemon-domainpop-dos(35285)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37193", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/37193" }, { "name": "25968", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25968" }, { "name": "1018342", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018342" }, { "name": "24787", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24787" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "name": "mdaemon-domainpop-dos(35285)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3622", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37193", "refsource": "OSVDB", "url": "http://osvdb.org/37193" }, { "name": "25968", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25968" }, { "name": "1018342", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018342" }, { "name": "24787", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24787" }, { "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt", "refsource": "CONFIRM", "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "name": "mdaemon-domainpop-dos(35285)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3622", "datePublished": "2007-07-09T16:00:00", "dateReserved": "2007-07-09T00:00:00", "dateUpdated": "2024-08-07T14:21:36.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2000-0716 (GCVE-0-2000-0716)
Vulnerability from cvelistv5
Published
2001-01-22 05:00
Modified
2024-08-08 05:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user's email.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/1553 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5070 | vdb-entry, x_refsource_XF | |
http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0008&L=ntbugtraq&F=&S=&P=459 | mailing-list, x_refsource_NTBUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:28:41.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1553", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1553" }, { "name": "mdaemon-session-id-hijack(5070)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5070" }, { "name": "20000809 Session hijacking in Alt-N\u0027s MDaemon 2.8", "tags": [ "mailing-list", "x_refsource_NTBUGTRAQ", "x_transferred" ], "url": "http://www.ntbugtraq.com/default.asp?pid=36\u0026sid=1\u0026A2=ind0008\u0026L=ntbugtraq\u0026F=\u0026S=\u0026P=459" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user\u0027s email." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-09-15T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1553", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1553" }, { "name": "mdaemon-session-id-hijack(5070)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5070" }, { "name": "20000809 Session hijacking in Alt-N\u0027s MDaemon 2.8", "tags": [ "mailing-list", "x_refsource_NTBUGTRAQ" ], "url": "http://www.ntbugtraq.com/default.asp?pid=36\u0026sid=1\u0026A2=ind0008\u0026L=ntbugtraq\u0026F=\u0026S=\u0026P=459" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0716", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user\u0027s email." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1553", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1553" }, { "name": "mdaemon-session-id-hijack(5070)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5070" }, { "name": "20000809 Session hijacking in Alt-N\u0027s MDaemon 2.8", "refsource": "NTBUGTRAQ", "url": "http://www.ntbugtraq.com/default.asp?pid=36\u0026sid=1\u0026A2=ind0008\u0026L=ntbugtraq\u0026F=\u0026S=\u0026P=459" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0716", "datePublished": "2001-01-22T05:00:00", "dateReserved": "2000-09-19T00:00:00", "dateUpdated": "2024-08-08T05:28:41.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-4266 (GCVE-0-2005-4266)
Vulnerability from cvelistv5
Published
2005-12-15 11:00
Modified
2024-09-16 18:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value.
References
▼ | URL | Tags |
---|---|---|
http://www.ipomonis.com/advisories/mdaemon.zip | x_refsource_MISC | |
http://secunia.com/advisories/17990 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:38:51.629Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ipomonis.com/advisories/mdaemon.zip" }, { "name": "17990", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17990" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-12-15T11:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.ipomonis.com/advisories/mdaemon.zip" }, { "name": "17990", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17990" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4266", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ipomonis.com/advisories/mdaemon.zip", "refsource": "MISC", "url": "http://www.ipomonis.com/advisories/mdaemon.zip" }, { "name": "17990", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17990" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4266", "datePublished": "2005-12-15T11:00:00Z", "dateReserved": "2005-12-15T00:00:00Z", "dateUpdated": "2024-09-16T18:03:49.820Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-0104 (GCVE-0-2001-0104)
Vulnerability from cvelistv5
Published
2001-02-02 05:00
Modified
2024-08-08 04:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
MDaemon Pro 3.5.1 and earlier allows local users to bypass the "lock server" security setting by pressing the Cancel button at the password prompt, then pressing the enter key.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/5763 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/2115 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/151156 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:06:55.419Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mdaemon-lock-bypass-password(5763)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5763" }, { "name": "2115", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2115" }, { "name": "20001214 Bypass MDaemon 3.5.1 \"Lock Server\" Protection", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/151156" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-12-14T00:00:00", "descriptions": [ { "lang": "en", "value": "MDaemon Pro 3.5.1 and earlier allows local users to bypass the \"lock server\" security setting by pressing the Cancel button at the password prompt, then pressing the enter key." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mdaemon-lock-bypass-password(5763)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5763" }, { "name": "2115", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2115" }, { "name": "20001214 Bypass MDaemon 3.5.1 \"Lock Server\" Protection", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/151156" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0104", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MDaemon Pro 3.5.1 and earlier allows local users to bypass the \"lock server\" security setting by pressing the Cancel button at the password prompt, then pressing the enter key." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mdaemon-lock-bypass-password(5763)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5763" }, { "name": "2115", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2115" }, { "name": "20001214 Bypass MDaemon 3.5.1 \"Lock Server\" Protection", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/151156" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0104", "datePublished": "2001-02-02T05:00:00", "dateReserved": "2001-02-01T00:00:00", "dateUpdated": "2024-08-08T04:06:55.419Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1471 (GCVE-0-2003-1471)
Vulnerability from cvelistv5
Published
2007-10-24 23:00
Modified
2024-08-08 02:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/11882 | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/7445 | vdb-entry, x_refsource_BID | |
http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:28:03.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mdaemon-pop3-negative-dos(11882)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882" }, { "name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html" }, { "name": "7445", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7445" }, { "name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-04-28T00:00:00", "descriptions": [ { "lang": "en", "value": "MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mdaemon-pop3-negative-dos(11882)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882" }, { "name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html" }, { "name": "7445", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7445" }, { "name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mdaemon-pop3-negative-dos(11882)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882" }, { "name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html" }, { "name": "7445", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7445" }, { "name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS", "refsource": "BUGTRAQ", "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1471", "datePublished": "2007-10-24T23:00:00", "dateReserved": "2007-10-24T00:00:00", "dateUpdated": "2024-08-08T02:28:03.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-4364 (GCVE-0-2006-4364)
Vulnerability from cvelistv5
Published
2006-08-25 23:00
Modified
2024-08-07 19:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/2245 | exploit, x_refsource_EXPLOIT-DB | |
http://securitytracker.com/id?1016729 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2006/3361 | vdb-entry, x_refsource_VUPEN | |
http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04 | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28517 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/444015/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securityreason.com/securityalert/1446 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/bid/19651 | vdb-entry, x_refsource_BID | |
http://files.altn.com/MDaemon/Release/RelNotes_en.txt | x_refsource_CONFIRM | |
http://secunia.com/advisories/21595 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/28125 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:06:07.630Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2245", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/2245" }, { "name": "1016729", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016729" }, { "name": "ADV-2006-3361", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3361" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04" }, { "name": "mdaemon-pop3-bo(28517)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517" }, { "name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded" }, { "name": "1446", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/1446" }, { "name": "19651", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19651" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "name": "21595", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21595" }, { "name": "28125", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/28125" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain \u0027@\u0027 characters in the (1) USER and (2) APOP commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2245", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/2245" }, { "name": "1016729", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016729" }, { "name": "ADV-2006-3361", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3361" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04" }, { "name": "mdaemon-pop3-bo(28517)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517" }, { "name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded" }, { "name": "1446", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/1446" }, { "name": "19651", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19651" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "name": "21595", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21595" }, { "name": "28125", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/28125" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4364", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain \u0027@\u0027 characters in the (1) USER and (2) APOP commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2245", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/2245" }, { "name": "1016729", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016729" }, { "name": "ADV-2006-3361", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3361" }, { "name": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04", "refsource": "MISC", "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04" }, { "name": "mdaemon-pop3-bo(28517)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517" }, { "name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded" }, { "name": "1446", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/1446" }, { "name": "19651", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19651" }, { "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt", "refsource": "CONFIRM", "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "name": "21595", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21595" }, { "name": "28125", "refsource": "OSVDB", "url": "http://www.osvdb.org/28125" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4364", "datePublished": "2006-08-25T23:00:00", "dateReserved": "2006-08-25T00:00:00", "dateUpdated": "2024-08-07T19:06:07.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-0925 (GCVE-0-2006-0925)
Vulnerability from cvelistv5
Published
2006-02-28 11:00
Modified
2024-08-07 16:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/24916 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/18921 | third-party-advisory, x_refsource_SECUNIA | |
http://www.nsag.ru/vuln/888.html | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2006/0729 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/16854 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:56:13.945Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mdaemon-imap-foldername-dos(24916)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916" }, { "name": "18921", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18921" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nsag.ru/vuln/888.html" }, { "name": "ADV-2006-0729", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0729" }, { "name": "16854", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16854" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mdaemon-imap-foldername-dos(24916)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916" }, { "name": "18921", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18921" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nsag.ru/vuln/888.html" }, { "name": "ADV-2006-0729", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0729" }, { "name": "16854", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16854" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0925", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mdaemon-imap-foldername-dos(24916)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916" }, { "name": "18921", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18921" }, { "name": "http://www.nsag.ru/vuln/888.html", "refsource": "MISC", "url": "http://www.nsag.ru/vuln/888.html" }, { "name": "ADV-2006-0729", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0729" }, { "name": "16854", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16854" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0925", "datePublished": "2006-02-28T11:00:00", "dateReserved": "2006-02-28T00:00:00", "dateUpdated": "2024-08-07T16:56:13.945Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-2646 (GCVE-0-2006-2646)
Vulnerability from cvelistv5
Published
2006-05-30 10:00
Modified
2024-08-07 17:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a '"' (double quote).
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/18129 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1016167 | vdb-entry, x_refsource_SECTRACK | |
http://marc.info/?l=full-disclosure&m=114882270912151&w=2 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:58:51.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "18129", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18129" }, { "name": "1016167", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016167" }, { "name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a \u0027\"\u0027 (double quote)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "18129", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18129" }, { "name": "1016167", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016167" }, { "name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-2646", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a \u0027\"\u0027 (double quote)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "18129", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18129" }, { "name": "1016167", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016167" }, { "name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH", "refsource": "FULLDISC", "url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-2646", "datePublished": "2006-05-30T10:00:00", "dateReserved": "2006-05-30T00:00:00", "dateUpdated": "2024-08-07T17:58:51.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1738 (GCVE-0-2002-1738)
Vulnerability from cvelistv5
Published
2005-06-21 04:00
Modified
2024-08-08 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Alt-N Technologies MDaemon 5.0.5.0 and earlier creates a default MDaemon mail account with a password of MServer, which could allow remote attackers to send anonymous email.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/4685 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/9024 | vdb-entry, x_refsource_XF | |
http://online.securityfocus.com/archive/1/271374 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:34:56.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "4685", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4685" }, { "name": "mdaemon-default-account(9024)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9024" }, { "name": "20020507 Multiple Vulnerabilities in MDaemon + WorldClient", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/271374" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-05-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Alt-N Technologies MDaemon 5.0.5.0 and earlier creates a default MDaemon mail account with a password of MServer, which could allow remote attackers to send anonymous email." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "4685", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4685" }, { "name": "mdaemon-default-account(9024)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9024" }, { "name": "20020507 Multiple Vulnerabilities in MDaemon + WorldClient", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/271374" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1738", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Alt-N Technologies MDaemon 5.0.5.0 and earlier creates a default MDaemon mail account with a password of MServer, which could allow remote attackers to send anonymous email." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "4685", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4685" }, { "name": "mdaemon-default-account(9024)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9024" }, { "name": "20020507 Multiple Vulnerabilities in MDaemon + WorldClient", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/271374" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1738", "datePublished": "2005-06-21T04:00:00", "dateReserved": "2005-06-21T00:00:00", "dateUpdated": "2024-08-08T03:34:56.225Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1470 (GCVE-0-2003-1470)
Vulnerability from cvelistv5
Published
2007-10-24 23:00
Modified
2024-08-08 02:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/7446 | vdb-entry, x_refsource_BID | |
http://securityreason.com/securityalert/3296 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/319879 | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11896 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:28:03.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "7446", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7446" }, { "name": "3296", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3296" }, { "name": "20030427 MDaemon SMTP/POP/IMAP server =\u003ev.6.7.5: IMAP buffer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/319879" }, { "name": "mdaemon-imap-create-bo(11896)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-04-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "7446", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7446" }, { "name": "3296", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3296" }, { "name": "20030427 MDaemon SMTP/POP/IMAP server =\u003ev.6.7.5: IMAP buffer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/319879" }, { "name": "mdaemon-imap-create-bo(11896)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1470", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "7446", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7446" }, { "name": "3296", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3296" }, { "name": "20030427 MDaemon SMTP/POP/IMAP server =\u003ev.6.7.5: IMAP buffer overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/319879" }, { "name": "mdaemon-imap-create-bo(11896)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1470", "datePublished": "2007-10-24T23:00:00", "dateReserved": "2007-10-24T00:00:00", "dateUpdated": "2024-08-08T02:28:03.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-5709 (GCVE-0-2006-5709)
Vulnerability from cvelistv5
Published
2006-11-04 01:00
Modified
2024-08-07 20:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a "JavaScript exploit."
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/22507 | third-party-advisory, x_refsource_SECUNIA | |
http://files.altn.com/MDaemon/Release/RelNotes_en.txt | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2006/4251 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:04:54.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "22507", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22507" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "name": "ADV-2006-4251", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4251" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a \"JavaScript exploit.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "22507", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22507" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "name": "ADV-2006-4251", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4251" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5709", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a \"JavaScript exploit.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "22507", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22507" }, { "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt", "refsource": "CONFIRM", "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "name": "ADV-2006-4251", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4251" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5709", "datePublished": "2006-11-04T01:00:00", "dateReserved": "2006-11-03T00:00:00", "dateUpdated": "2024-08-07T20:04:54.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2000-1020 (GCVE-0-2000-1020)
Vulnerability from cvelistv5
Published
2000-11-29 05:00
Modified
2024-08-08 05:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap overflow in Worldclient in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/1689 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5250 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=96925269716274&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:37:32.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1689", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1689" }, { "name": "mdaemon-url-dos(5250)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5250" }, { "name": "20000917 VIGILANTE-2000012: Mdaemon Web Services Heap Overflow DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=96925269716274\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-09-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap overflow in Worldclient in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1689", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1689" }, { "name": "mdaemon-url-dos(5250)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5250" }, { "name": "20000917 VIGILANTE-2000012: Mdaemon Web Services Heap Overflow DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=96925269716274\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-1020", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap overflow in Worldclient in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1689", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1689" }, { "name": "mdaemon-url-dos(5250)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5250" }, { "name": "20000917 VIGILANTE-2000012: Mdaemon Web Services Heap Overflow DoS", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=96925269716274\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-1020", "datePublished": "2000-11-29T05:00:00", "dateReserved": "2000-11-24T00:00:00", "dateUpdated": "2024-08-08T05:37:32.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2000-0399 (GCVE-0-2000-0399)
Vulnerability from cvelistv5
Published
2000-07-12 04:00
Modified
2024-08-08 05:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in MDaemon POP server allows remote attackers to cause a denial of service via a long user name.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/1250 | vdb-entry, x_refsource_BID | |
http://archives.neohapsis.com/archives/bugtraq/2000-05/0301.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:14:21.508Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1250", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1250" }, { "name": "20000524 Deerfield Communications MDaemon Mail Server DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0301.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-05-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in MDaemon POP server allows remote attackers to cause a denial of service via a long user name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1250", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1250" }, { "name": "20000524 Deerfield Communications MDaemon Mail Server DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0301.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0399", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in MDaemon POP server allows remote attackers to cause a denial of service via a long user name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1250", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1250" }, { "name": "20000524 Deerfield Communications MDaemon Mail Server DoS", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0301.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0399", "datePublished": "2000-07-12T04:00:00", "dateReserved": "2000-06-14T00:00:00", "dateUpdated": "2024-08-08T05:14:21.508Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-0583 (GCVE-0-2001-0583)
Vulnerability from cvelistv5
Published
2001-07-27 04:00
Modified
2024-08-08 04:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Alt-N Technologies MDaemon 3.5.4 allows a remote attacker to create a denial of service via the URL request of a MS-DOS device (such as GET /aux) to (1) the Worldclient service at port 3000, or (2) the Webconfig service at port 3001.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2001-03/0188.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6240 | vdb-entry, x_refsource_XF | |
http://ftp1.deerfield.com/pub/mdaemon/Archive/3.5.6/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:30:04.807Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20010315 def-2001-11: MDaemon 3.5.4 Dos-Device DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0188.html" }, { "name": "mdaemon-webservices-dos(6240)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6240" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp1.deerfield.com/pub/mdaemon/Archive/3.5.6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Alt-N Technologies MDaemon 3.5.4 allows a remote attacker to create a denial of service via the URL request of a MS-DOS device (such as GET /aux) to (1) the Worldclient service at port 3000, or (2) the Webconfig service at port 3001." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20010315 def-2001-11: MDaemon 3.5.4 Dos-Device DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0188.html" }, { "name": "mdaemon-webservices-dos(6240)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6240" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp1.deerfield.com/pub/mdaemon/Archive/3.5.6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0583", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Alt-N Technologies MDaemon 3.5.4 allows a remote attacker to create a denial of service via the URL request of a MS-DOS device (such as GET /aux) to (1) the Worldclient service at port 3000, or (2) the Webconfig service at port 3001." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20010315 def-2001-11: MDaemon 3.5.4 Dos-Device DoS", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0188.html" }, { "name": "mdaemon-webservices-dos(6240)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6240" }, { "name": "http://ftp1.deerfield.com/pub/mdaemon/Archive/3.5.6/", "refsource": "CONFIRM", "url": "http://ftp1.deerfield.com/pub/mdaemon/Archive/3.5.6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0583", "datePublished": "2001-07-27T04:00:00", "dateReserved": "2001-07-27T00:00:00", "dateUpdated": "2024-08-08T04:30:04.807Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-0584 (GCVE-0-2001-0584)
Vulnerability from cvelistv5
Published
2001-07-27 04:00
Modified
2024-08-08 04:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IMAP server in Alt-N Technologies MDaemon 3.5.6 allows a local user to cause a denial of service (hang) via long (1) SELECT or (2) EXAMINE commands.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/6279 | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/bugtraq/2001-03/0365.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/2508 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:30:05.935Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mdaemon-imap-command-dos(6279)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6279" }, { "name": "20010325 MDaemon IMAP Denial Of Service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0365.html" }, { "name": "2508", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2508" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-03-25T00:00:00", "descriptions": [ { "lang": "en", "value": "IMAP server in Alt-N Technologies MDaemon 3.5.6 allows a local user to cause a denial of service (hang) via long (1) SELECT or (2) EXAMINE commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mdaemon-imap-command-dos(6279)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6279" }, { "name": "20010325 MDaemon IMAP Denial Of Service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0365.html" }, { "name": "2508", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2508" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0584", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IMAP server in Alt-N Technologies MDaemon 3.5.6 allows a local user to cause a denial of service (hang) via long (1) SELECT or (2) EXAMINE commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mdaemon-imap-command-dos(6279)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6279" }, { "name": "20010325 MDaemon IMAP Denial Of Service", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0365.html" }, { "name": "2508", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2508" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0584", "datePublished": "2001-07-27T04:00:00", "dateReserved": "2001-07-27T00:00:00", "dateUpdated": "2024-08-08T04:30:05.935Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2000-0501 (GCVE-0-2000-0501)
Vulnerability from cvelistv5
Published
2000-10-13 04:00
Modified
2024-08-08 05:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Race condition in MDaemon 2.8.5.0 POP server allows local users to cause a denial of service by entering a UIDL command and quickly exiting the server.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/4745 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/1366 | vdb-entry, x_refsource_BID | |
http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0277.html | mailing-list, x_refsource_NTBUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:21:31.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mdaemon-pass-dos(4745)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4745" }, { "name": "1366", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1366" }, { "name": "20000616 mdaemon 2.8.5.0 WinNT and Win9x remote DoS", "tags": [ "mailing-list", "x_refsource_NTBUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0277.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-06-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in MDaemon 2.8.5.0 POP server allows local users to cause a denial of service by entering a UIDL command and quickly exiting the server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mdaemon-pass-dos(4745)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4745" }, { "name": "1366", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1366" }, { "name": "20000616 mdaemon 2.8.5.0 WinNT and Win9x remote DoS", "tags": [ "mailing-list", "x_refsource_NTBUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0277.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0501", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in MDaemon 2.8.5.0 POP server allows local users to cause a denial of service by entering a UIDL command and quickly exiting the server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mdaemon-pass-dos(4745)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4745" }, { "name": "1366", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1366" }, { "name": "20000616 mdaemon 2.8.5.0 WinNT and Win9x remote DoS", "refsource": "NTBUGTRAQ", "url": "http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0277.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0501", "datePublished": "2000-10-13T04:00:00", "dateReserved": "2000-07-11T00:00:00", "dateUpdated": "2024-08-08T05:21:31.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-1546 (GCVE-0-2004-1546)
Vulnerability from cvelistv5
Published
2005-02-20 05:00
Modified
2024-08-08 00:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple buffer overflows in MDaemon 6.5.1 allow remote attackers to cause a denial of service (application crash) via a long (1) SAML, SOML, SEND, or MAIL command to the SMTP server or (2) LIST command to the IMAP server.
References
▼ | URL | Tags |
---|---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026770.html | mailing-list, x_refsource_FULLDISC | |
http://www.osvdb.org/10224 | vdb-entry, x_refsource_OSVDB | |
http://www.osvdb.org/10223 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17477 | vdb-entry, x_refsource_XF | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17476 | vdb-entry, x_refsource_XF | |
http://www.securitylab.ru/48146.html | x_refsource_MISC | |
http://marc.info/?l=bugtraq&m=109591179510781&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/11238 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:53:24.194Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040922 Remote buffer overflow in MDaemon IMAP and SMTP server", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026770.html" }, { "name": "10224", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/10224" }, { "name": "10223", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/10223" }, { "name": "mdaemon-smtp-bo(17477)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17477" }, { "name": "mdaemon-imap-list-bo(17476)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17476" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securitylab.ru/48146.html" }, { "name": "20040922 Remote buffer overflow in MDaemon IMAP and SMTP server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109591179510781\u0026w=2" }, { "name": "11238", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11238" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in MDaemon 6.5.1 allow remote attackers to cause a denial of service (application crash) via a long (1) SAML, SOML, SEND, or MAIL command to the SMTP server or (2) LIST command to the IMAP server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040922 Remote buffer overflow in MDaemon IMAP and SMTP server", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026770.html" }, { "name": "10224", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/10224" }, { "name": "10223", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/10223" }, { "name": "mdaemon-smtp-bo(17477)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17477" }, { "name": "mdaemon-imap-list-bo(17476)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17476" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securitylab.ru/48146.html" }, { "name": "20040922 Remote buffer overflow in MDaemon IMAP and SMTP server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109591179510781\u0026w=2" }, { "name": "11238", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11238" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1546", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in MDaemon 6.5.1 allow remote attackers to cause a denial of service (application crash) via a long (1) SAML, SOML, SEND, or MAIL command to the SMTP server or (2) LIST command to the IMAP server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040922 Remote buffer overflow in MDaemon IMAP and SMTP server", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026770.html" }, { "name": "10224", "refsource": "OSVDB", "url": "http://www.osvdb.org/10224" }, { "name": "10223", "refsource": "OSVDB", "url": "http://www.osvdb.org/10223" }, { "name": "mdaemon-smtp-bo(17477)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17477" }, { "name": "mdaemon-imap-list-bo(17476)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17476" }, { "name": "http://www.securitylab.ru/48146.html", "refsource": "MISC", "url": "http://www.securitylab.ru/48146.html" }, { "name": "20040922 Remote buffer overflow in MDaemon IMAP and SMTP server", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109591179510781\u0026w=2" }, { "name": "11238", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11238" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1546", "datePublished": "2005-02-20T05:00:00", "dateReserved": "2005-02-20T00:00:00", "dateUpdated": "2024-08-08T00:53:24.194Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-4209 (GCVE-0-2005-4209)
Vulnerability from cvelistv5
Published
2005-12-13 11:00
Modified
2024-08-07 23:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://www.ipomonis.com/advisories/mdaemon.zip | x_refsource_MISC | |
http://www.securityfocus.com/bid/15815 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/23551 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/17990 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:38:51.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ipomonis.com/advisories/mdaemon.zip" }, { "name": "15815", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15815" }, { "name": "mdaemon-worldclient-subject-dos(23551)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23551" }, { "name": "17990", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17990" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.ipomonis.com/advisories/mdaemon.zip" }, { "name": "15815", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15815" }, { "name": "mdaemon-worldclient-subject-dos(23551)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23551" }, { "name": "17990", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17990" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4209", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ipomonis.com/advisories/mdaemon.zip", "refsource": "MISC", "url": "http://www.ipomonis.com/advisories/mdaemon.zip" }, { "name": "15815", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15815" }, { "name": "mdaemon-worldclient-subject-dos(23551)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23551" }, { "name": "17990", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17990" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4209", "datePublished": "2005-12-13T11:00:00", "dateReserved": "2005-12-13T00:00:00", "dateUpdated": "2024-08-07T23:38:51.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-6967 (GCVE-0-2008-6967)
Vulnerability from cvelistv5
Published
2009-08-13 16:00
Modified
2024-08-07 11:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2008/3206 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/32142 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46688 | vdb-entry, x_refsource_XF | |
http://files.altn.com/MDaemon/Release/RelNotes_en.txt | x_refsource_CONFIRM | |
http://osvdb.org/50011 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/32355 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:49:02.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2008-3206", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3206" }, { "name": "32142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32142" }, { "name": "worldclient-html-xss(46688)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "name": "50011", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/50011" }, { "name": "32355", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32355" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2008-3206", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3206" }, { "name": "32142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32142" }, { "name": "worldclient-html-xss(46688)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "name": "50011", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/50011" }, { "name": "32355", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32355" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6967", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2008-3206", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3206" }, { "name": "32142", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32142" }, { "name": "worldclient-html-xss(46688)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688" }, { "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt", "refsource": "CONFIRM", "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "name": "50011", "refsource": "OSVDB", "url": "http://osvdb.org/50011" }, { "name": "32355", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32355" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6967", "datePublished": "2009-08-13T16:00:00", "dateReserved": "2009-08-13T00:00:00", "dateUpdated": "2024-08-07T11:49:02.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-2292 (GCVE-0-2004-2292)
Vulnerability from cvelistv5
Published
2005-08-04 04:00
Modified
2024-08-08 01:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Alt-N MDaemon 7.0.1 allows remote attackers to cause a denial of service (application crash) via a long STATUS command to the IMAP server.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/10366 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16118 | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0527.html | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:22:13.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "10366", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10366" }, { "name": "mdaemon-imap-status-bo(16118)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16118" }, { "name": "20040512 Mdaemon 7.0.1 IMAP overflow.", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0527.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-05-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Alt-N MDaemon 7.0.1 allows remote attackers to cause a denial of service (application crash) via a long STATUS command to the IMAP server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "10366", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10366" }, { "name": "mdaemon-imap-status-bo(16118)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16118" }, { "name": "20040512 Mdaemon 7.0.1 IMAP overflow.", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0527.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2292", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Alt-N MDaemon 7.0.1 allows remote attackers to cause a denial of service (application crash) via a long STATUS command to the IMAP server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "10366", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10366" }, { "name": "mdaemon-imap-status-bo(16118)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16118" }, { "name": "20040512 Mdaemon 7.0.1 IMAP overflow.", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0527.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2292", "datePublished": "2005-08-04T04:00:00", "dateReserved": "2005-08-04T00:00:00", "dateUpdated": "2024-08-08T01:22:13.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-2504 (GCVE-0-2004-2504)
Vulnerability from cvelistv5
Published
2005-10-25 04:00
Modified
2024-08-08 01:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The GUI in Alt-N Technologies MDaemon 7.2 and earlier, including 6.8, executes child processes such as NOTEPAD.EXE with SYSTEM privileges when users create new files, which allows local users with physical access to gain privileges.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/18287 | vdb-entry, x_refsource_XF | |
http://securitytracker.com/id?1012350 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/13225 | third-party-advisory, x_refsource_SECUNIA | |
http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1324.html | mailing-list, x_refsource_FULLDISC | |
http://www.osvdb.org/12158 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/11736 | vdb-entry, x_refsource_BID | |
http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1353.html | mailing-list, x_refsource_FULLDISC | |
http://archives.neohapsis.com/archives/bugtraq/2004-11/0385.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:29:13.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mdaemon-gain-privileges(18287)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18287" }, { "name": "1012350", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1012350" }, { "name": "13225", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13225" }, { "name": "20041129 Privilege escalation flaw in MDaemon 7.2.", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1324.html" }, { "name": "12158", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/12158" }, { "name": "11736", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11736" }, { "name": "20041130 Re: Privilege escalation flaw in MDaemon 7.2.", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1353.html" }, { "name": "20041129 Privilege escalation flaw in MDaemon 7.2.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0385.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-11-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The GUI in Alt-N Technologies MDaemon 7.2 and earlier, including 6.8, executes child processes such as NOTEPAD.EXE with SYSTEM privileges when users create new files, which allows local users with physical access to gain privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mdaemon-gain-privileges(18287)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18287" }, { "name": "1012350", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1012350" }, { "name": "13225", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13225" }, { "name": "20041129 Privilege escalation flaw in MDaemon 7.2.", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1324.html" }, { "name": "12158", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/12158" }, { "name": "11736", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11736" }, { "name": "20041130 Re: Privilege escalation flaw in MDaemon 7.2.", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1353.html" }, { "name": "20041129 Privilege escalation flaw in MDaemon 7.2.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0385.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2504", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The GUI in Alt-N Technologies MDaemon 7.2 and earlier, including 6.8, executes child processes such as NOTEPAD.EXE with SYSTEM privileges when users create new files, which allows local users with physical access to gain privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mdaemon-gain-privileges(18287)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18287" }, { "name": "1012350", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1012350" }, { "name": "13225", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13225" }, { "name": "20041129 Privilege escalation flaw in MDaemon 7.2.", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1324.html" }, { "name": "12158", "refsource": "OSVDB", "url": "http://www.osvdb.org/12158" }, { "name": "11736", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11736" }, { "name": "20041130 Re: Privilege escalation flaw in MDaemon 7.2.", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1353.html" }, { "name": "20041129 Privilege escalation flaw in MDaemon 7.2.", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0385.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2504", "datePublished": "2005-10-25T04:00:00", "dateReserved": "2005-10-25T00:00:00", "dateUpdated": "2024-08-08T01:29:13.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-5968 (GCVE-0-2006-5968)
Vulnerability from cvelistv5
Published
2006-11-17 22:00
Modified
2024-08-07 20:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/secunia_research/2006-67/advisory/ | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2006/4538 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/451821/100/100/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/21554 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30331 | vdb-entry, x_refsource_XF | |
http://securityreason.com/securityalert/1890 | third-party-advisory, x_refsource_SREASON | |
http://securitytracker.com/id?1017238 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:12:31.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-67/advisory/" }, { "name": "ADV-2006-4538", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4538" }, { "name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded" }, { "name": "21554", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21554" }, { "name": "mdaemon-folder-privilege-escalation(30331)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331" }, { "name": "1890", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/1890" }, { "name": "1017238", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017238" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-11-16T00:00:00", "descriptions": [ { "lang": "en", "value": "MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\\APP folder, which is an untrusted search path element due to insecure permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-67/advisory/" }, { "name": "ADV-2006-4538", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4538" }, { "name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded" }, { "name": "21554", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21554" }, { "name": "mdaemon-folder-privilege-escalation(30331)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331" }, { "name": "1890", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/1890" }, { "name": "1017238", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017238" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2006-5968", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\\APP folder, which is an untrusted search path element due to insecure permissions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/secunia_research/2006-67/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-67/advisory/" }, { "name": "ADV-2006-4538", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4538" }, { "name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded" }, { "name": "21554", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21554" }, { "name": "mdaemon-folder-privilege-escalation(30331)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331" }, { "name": "1890", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/1890" }, { "name": "1017238", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017238" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2006-5968", "datePublished": "2006-11-17T22:00:00", "dateReserved": "2006-11-17T00:00:00", "dateUpdated": "2024-08-07T20:12:31.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1539 (GCVE-0-2002-1539)
Vulnerability from cvelistv5
Published
2003-03-18 05:00
Modified
2024-08-08 03:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service via long (1) DELE or (2) UIDL arguments.
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/10488.php | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/bugtraq/2002-10/0382.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/6053 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:26:28.698Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mdaemon-dele-uidl-dos(10488)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10488.php" }, { "name": "20021027 MDaemon SMTP/POP/IMAP server DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0382.html" }, { "name": "6053", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6053" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service via long (1) DELE or (2) UIDL arguments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mdaemon-dele-uidl-dos(10488)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10488.php" }, { "name": "20021027 MDaemon SMTP/POP/IMAP server DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0382.html" }, { "name": "6053", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6053" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1539", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service via long (1) DELE or (2) UIDL arguments." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mdaemon-dele-uidl-dos(10488)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10488.php" }, { "name": "20021027 MDaemon SMTP/POP/IMAP server DoS", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0382.html" }, { "name": "6053", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6053" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1539", "datePublished": "2003-03-18T05:00:00", "dateReserved": "2003-02-25T00:00:00", "dateUpdated": "2024-08-08T03:26:28.698Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2000-1021 (GCVE-0-2000-1021)
Vulnerability from cvelistv5
Published
2000-11-29 05:00
Modified
2024-08-08 05:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap overflow in WebConfig in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/1689 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5250 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=96925269716274&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:37:32.349Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1689", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1689" }, { "name": "mdaemon-url-dos(5250)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5250" }, { "name": "20000917 VIGILANTE-2000012: Mdaemon Web Services Heap Overflow DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=96925269716274\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-09-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap overflow in WebConfig in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1689", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1689" }, { "name": "mdaemon-url-dos(5250)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5250" }, { "name": "20000917 VIGILANTE-2000012: Mdaemon Web Services Heap Overflow DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=96925269716274\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-1021", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap overflow in WebConfig in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1689", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1689" }, { "name": "mdaemon-url-dos(5250)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5250" }, { "name": "20000917 VIGILANTE-2000012: Mdaemon Web Services Heap Overflow DoS", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=96925269716274\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-1021", "datePublished": "2000-11-29T05:00:00", "dateReserved": "2000-11-24T00:00:00", "dateUpdated": "2024-08-08T05:37:32.349Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-5708 (GCVE-0-2006-5708)
Vulnerability from cvelistv5
Published
2006-11-04 01:00
Modified
2025-04-03 15:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks.
References
▼ | URL | Tags |
---|---|---|
http://files.altn.com/MDaemon/Release/RelNotes_en.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:04:54.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2006-5708", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T15:25:25.541724Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T15:26:14.870Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-11-04T01:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5708", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt", "refsource": "CONFIRM", "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5708", "datePublished": "2006-11-04T01:00:00.000Z", "dateReserved": "2006-11-03T00:00:00.000Z", "dateUpdated": "2025-04-03T15:26:14.870Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1200 (GCVE-0-2003-1200)
Vulnerability from cvelistv5
Published
2005-05-10 04:00
Modified
2024-08-08 02:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/14097 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/3255 | vdb-entry, x_refsource_OSVDB | |
http://hat-squad.com/bugreport/mdaemon-raw.txt | x_refsource_MISC | |
http://secunia.com/advisories/10512 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/348454 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/9317 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=107936753929354&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:19:45.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mdaemon-form2raw-from-bo(14097)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14097" }, { "name": "3255", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/3255" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://hat-squad.com/bugreport/mdaemon-raw.txt" }, { "name": "10512", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/10512" }, { "name": "20031229 [Hat-Squad] Remote buffer overflow in Mdaemon Raw message Handler", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/348454" }, { "name": "9317", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9317" }, { "name": "20040314 Rosiello Security\u0027s exploit for MDaemon", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107936753929354\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-12-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mdaemon-form2raw-from-bo(14097)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14097" }, { "name": "3255", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/3255" }, { "tags": [ "x_refsource_MISC" ], "url": "http://hat-squad.com/bugreport/mdaemon-raw.txt" }, { "name": "10512", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/10512" }, { "name": "20031229 [Hat-Squad] Remote buffer overflow in Mdaemon Raw message Handler", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/348454" }, { "name": "9317", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9317" }, { "name": "20040314 Rosiello Security\u0027s exploit for MDaemon", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107936753929354\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1200", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mdaemon-form2raw-from-bo(14097)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14097" }, { "name": "3255", "refsource": "OSVDB", "url": "http://www.osvdb.org/3255" }, { "name": "http://hat-squad.com/bugreport/mdaemon-raw.txt", "refsource": "MISC", "url": "http://hat-squad.com/bugreport/mdaemon-raw.txt" }, { "name": "10512", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/10512" }, { "name": "20031229 [Hat-Squad] Remote buffer overflow in Mdaemon Raw message Handler", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/348454" }, { "name": "9317", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9317" }, { "name": "20040314 Rosiello Security\u0027s exploit for MDaemon", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107936753929354\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1200", "datePublished": "2005-05-10T04:00:00", "dateReserved": "2005-05-04T00:00:00", "dateUpdated": "2024-08-08T02:19:45.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-0064 (GCVE-0-2001-0064)
Vulnerability from cvelistv5
Published
2001-02-02 05:00
Modified
2024-08-08 04:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Webconfig, IMAP, and other services in MDaemon 3.5.0 and earlier allows remote attackers to cause a denial of service via a long URL terminated by a "\r\n" string.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-12/0315.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/2134 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:06:55.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20001219 def-2000-03: MDaemon 3.5.0 DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0315.html" }, { "name": "2134", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2134" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Webconfig, IMAP, and other services in MDaemon 3.5.0 and earlier allows remote attackers to cause a denial of service via a long URL terminated by a \"\\r\\n\" string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-05-08T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20001219 def-2000-03: MDaemon 3.5.0 DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0315.html" }, { "name": "2134", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2134" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0064", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Webconfig, IMAP, and other services in MDaemon 3.5.0 and earlier allows remote attackers to cause a denial of service via a long URL terminated by a \"\\r\\n\" string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20001219 def-2000-03: MDaemon 3.5.0 DoS", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0315.html" }, { "name": "2134", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2134" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0064", "datePublished": "2001-02-02T05:00:00", "dateReserved": "2001-02-01T00:00:00", "dateUpdated": "2024-08-08T04:06:55.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1740 (GCVE-0-2002-1740)
Vulnerability from cvelistv5
Published
2005-06-21 04:00
Modified
2024-08-08 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in WorldClient.cgi in WorldClient in Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to execute arbitrary code via a long folder name (NewFolder parameter).
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/4689 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/9026 | vdb-entry, x_refsource_XF | |
http://online.securityfocus.com/archive/1/271374 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:34:56.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "4689", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4689" }, { "name": "mdaemon-worldclient-foldername-bo(9026)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9026" }, { "name": "20020507 Multiple Vulnerabilities in MDaemon + WorldClient", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/271374" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-05-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in WorldClient.cgi in WorldClient in Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to execute arbitrary code via a long folder name (NewFolder parameter)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "4689", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4689" }, { "name": "mdaemon-worldclient-foldername-bo(9026)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9026" }, { "name": "20020507 Multiple Vulnerabilities in MDaemon + WorldClient", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/271374" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1740", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in WorldClient.cgi in WorldClient in Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to execute arbitrary code via a long folder name (NewFolder parameter)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "4689", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4689" }, { "name": "mdaemon-worldclient-foldername-bo(9026)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9026" }, { "name": "20020507 Multiple Vulnerabilities in MDaemon + WorldClient", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/271374" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1740", "datePublished": "2005-06-21T04:00:00", "dateReserved": "2005-06-21T00:00:00", "dateUpdated": "2024-08-08T03:34:56.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2005-12-13 11:03
Modified
2025-04-03 01:03
Severity ?
Summary
WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
alt-n | mdaemon | 8.1.3 | |
alt-n | worldclient | 8.1.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "BB67A240-BF23-4B74-944D-127B263154E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability." } ], "id": "CVE-2005-4209", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-13T11:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17990" }, { "source": "cve@mitre.org", "url": "http://www.ipomonis.com/advisories/mdaemon.zip" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/15815" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://secunia.com/advisories/17990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ipomonis.com/advisories/mdaemon.zip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/15815" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23551" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-08-22 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Alt-N Technologies MDaemon 3.5.4 allows a remote attacker to create a denial of service via the URL request of a MS-DOS device (such as GET /aux) to (1) the Worldclient service at port 3000, or (2) the Webconfig service at port 3001.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*", "matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*", "matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Alt-N Technologies MDaemon 3.5.4 allows a remote attacker to create a denial of service via the URL request of a MS-DOS device (such as GET /aux) to (1) the Worldclient service at port 3000, or (2) the Webconfig service at port 3001." } ], "id": "CVE-2001-0583", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-08-22T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0188.html" }, { "source": "cve@mitre.org", "url": "http://ftp1.deerfield.com/pub/mdaemon/Archive/3.5.6/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6240" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0188.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ftp1.deerfield.com/pub/mdaemon/Archive/3.5.6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6240" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user's email.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user\u0027s email." } ], "id": "CVE-2000-0716", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2000-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ntbugtraq.com/default.asp?pid=36\u0026sid=1\u0026A2=ind0008\u0026L=ntbugtraq\u0026F=\u0026S=\u0026P=459" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1553" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5070" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ntbugtraq.com/default.asp?pid=36\u0026sid=1\u0026A2=ind0008\u0026L=ntbugtraq\u0026F=\u0026S=\u0026P=459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5070" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*", "matchCriteriaId": "05E2D56C-250D-4CD9-97F6-3FB6080B248D", "versionEndIncluding": "6.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number." } ], "id": "CVE-2003-1471", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/7445" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/7445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-08-13 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E29B9A0-41DA-48C6-9CCE-746256C18D02", "versionEndIncluding": "10.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "7503CBFE-B6F8-457E-BA78-16414EE14789", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*", "matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*", "matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*", "matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*", "matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB9AF729-E2FA-4703-86AB-AD7416BD6EBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "72594AA0-3CB8-4F87-B709-F81E18D2ECBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "50D5F6E0-2047-4531-8C01-D79D3AE69170", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "9CEAB790-561D-4815-99E0-78B62294B54E", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "20CB70E2-1E3A-4FC1-BD26-E22EAC68D874", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DC8AC4F7-CADE-448D-82C6-C4D19EAAADFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "A4A93052-5501-431A-B6E5-7C0574C66C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "D5CE884A-B10D-4E2F-B020-92C2CB2CAE02", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.50:*:*:*:*:*:*:*", "matchCriteriaId": "CF4AD8B6-940B-445F-83EE-77379CFF36DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "1A3610BC-6E11-437F-B7DF-3FEC2812BBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.53:*:*:*:*:*:*:*", "matchCriteriaId": "B578384C-73DA-4D2A-8A5D-5293391A3172", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.60:*:*:*:*:*:*:*", "matchCriteriaId": "964F316B-E449-49BA-8FF6-343D20AA7716", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.64:*:*:*:*:*:*:*", "matchCriteriaId": "315E7C89-460E-4A0F-89B9-9228DCC1EF00", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF20F74D-1767-411D-9474-F2597293E1F1", "versionEndIncluding": "10.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6D4C366-2A06-4D1E-AC25-368CFA4D2305", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:2.1:*:standard:*:*:*:*:*", "matchCriteriaId": "27A288FA-8810-4615-B2AD-E595FEDA3A66", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "97FD2E84-B802-4BDA-A39B-D84F67ABC21C", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:5.0:*:pro:*:*:*:*:*", "matchCriteriaId": "B12B5202-F814-4962-A09E-44B9C075FF1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9343C918-6C63-4EE7-9B30-30C1209041C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "13AE088E-E03F-4BB0-8A5B-ED2734B3B0D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "2DFD683F-21E3-49CA-B22A-40FA79FECF57", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "6CC30F32-5C76-4D1A-979D-949D0C1DC39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F4FAD806-A5CE-46D5-AD59-13F364F988EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "BB67A240-BF23-4B74-944D-127B263154E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidad no especificada en WorldClient en Alt-N MDaemon anteriores a v10.02 tienen impacto desconocido y vector de ataque, probablemente relativo a de ejecuci\u00f3n de secuencias de comandos en sitios cruzados - XSS - WorldClient DLL v10.0.1, una vulnerabilidad diferente que CVE-2008-6893." } ], "id": "CVE-2008-6967", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-13T16:30:01.077", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/50011" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32142" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/32355" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/3206" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/50011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/32355" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/3206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The GUI in Alt-N Technologies MDaemon 7.2 and earlier, including 6.8, executes child processes such as NOTEPAD.EXE with SYSTEM privileges when users create new files, which allows local users with physical access to gain privileges.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "437D2888-340C-48AB-815E-C04E5DE44CAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "46604A07-FBB0-4111-8B1C-2D01086BBB71", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "3AD17AD0-27FE-49F5-A23D-2DE672D87C17", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GUI in Alt-N Technologies MDaemon 7.2 and earlier, including 6.8, executes child processes such as NOTEPAD.EXE with SYSTEM privileges when users create new files, which allows local users with physical access to gain privileges." } ], "id": "CVE-2004-2504", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0385.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1324.html" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1353.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/13225" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://securitytracker.com/id?1012350" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/12158" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/11736" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0385.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1324.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1353.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/13225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://securitytracker.com/id?1012350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/12158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/11736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18287" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-11-04 01:07
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a "JavaScript exploit."
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4E380CE-3453-46AF-BDEE-3AB04997E5A0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a \"JavaScript exploit.\"" }, { "lang": "es", "value": "Vulnerabilidad no especificada en WorldClient de Alt-N Technologies MDaemon versiones anteriores a 9.50 tiene un impacto desconocido y vectores de ataque referidos a \"JavaScript exploit.\"" } ], "id": "CVE-2006-5709", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-11-04T01:07:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22507" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/4251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4251" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-12-11 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Heap overflow in WebConfig in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap overflow in WebConfig in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL." } ], "id": "CVE-2000-1021", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-12-11T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=96925269716274\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1689" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=96925269716274\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5250" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-11-17 22:07
Modified
2025-04-09 00:30
Severity ?
Summary
MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "20CB70E2-1E3A-4FC1-BD26-E22EAC68D874", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DC8AC4F7-CADE-448D-82C6-C4D19EAAADFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.51:*:*:*:*:*:*:*", "matchCriteriaId": "1A3610BC-6E11-437F-B7DF-3FEC2812BBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.53:*:*:*:*:*:*:*", "matchCriteriaId": "B578384C-73DA-4D2A-8A5D-5293391A3172", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\\APP folder, which is an untrusted search path element due to insecure permissions." }, { "lang": "es", "value": "MDaemon 9.0.5, 9.0.6, 9.51, y 9.53, y posiblemente otras versiones, instalan la carpeta de la aplicaci\u00f3n MDaemon con permisos no seguros (los usuarios crean ficheros/directorios), lo cual permite a un usuario local ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de la creacion de c\u00f3digo malicioso de las librerias RASAPI32.DLL o MPRAPI.DLL en la carpeta MDaemon\\APP, lo cual no es una carpeta de b\u00fasqueda correcta debido a lo permisos poco seguros." } ], "id": "CVE-2006-5968", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-11-17T22:07:00.000", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/21554" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-67/advisory/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://securityreason.com/securityalert/1890" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://securitytracker.com/id?1017238" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.vupen.com/english/advisories/2006/4538" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-67/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/1890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-09 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8495C07-40E4-45D2-B7CE-F5BEBC6CEBA7", "versionEndIncluding": "9.60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages." }, { "lang": "es", "value": "Vulnerabilidad no especificada en DomainPOP en Alt-N Technologies MDaemon anterior a 9.61 permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida) a trav\u00e9s de mensajes malformados." } ], "id": "CVE-2007-3622", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-09T16:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/37193" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25968" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24787" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018342" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/37193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018342" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-08-22 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
IMAP server in Alt-N Technologies MDaemon 3.5.6 allows a local user to cause a denial of service (hang) via long (1) SELECT or (2) EXAMINE commands.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2001-03/0365.html | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/2508 | Exploit, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/6279 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2001-03/0365.html | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/2508 | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/6279 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IMAP server in Alt-N Technologies MDaemon 3.5.6 allows a local user to cause a denial of service (hang) via long (1) SELECT or (2) EXAMINE commands." } ], "id": "CVE-2001-0584", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-08-22T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0365.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2508" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0365.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2508" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6279" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-11-04 01:07
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
alt-n | mdaemon | * | |
alt-n | mdaemon | 2.8 | |
alt-n | mdaemon | 2.8.5.0 | |
alt-n | mdaemon | 2.71_sp1 | |
alt-n | mdaemon | 3.0.3 | |
alt-n | mdaemon | 3.0.4 | |
alt-n | mdaemon | 3.1.1 | |
alt-n | mdaemon | 3.1.2 | |
alt-n | mdaemon | 3.1_beta | |
alt-n | mdaemon | 3.5.0 | |
alt-n | mdaemon | 3.5.1 | |
alt-n | mdaemon | 3.5.4 | |
alt-n | mdaemon | 3.5.4 | |
alt-n | mdaemon | 3.5.4 | |
alt-n | mdaemon | 3.5.6 | |
alt-n | mdaemon | 5.0 | |
alt-n | mdaemon | 5.0 | |
alt-n | mdaemon | 5.0.1 | |
alt-n | mdaemon | 5.0.2 | |
alt-n | mdaemon | 5.0.3 | |
alt-n | mdaemon | 5.0.4 | |
alt-n | mdaemon | 5.0.5 | |
alt-n | mdaemon | 5.0.6 | |
alt-n | mdaemon | 5.0.7 | |
alt-n | mdaemon | 6.0 | |
alt-n | mdaemon | 6.0.5 | |
alt-n | mdaemon | 6.0.6 | |
alt-n | mdaemon | 6.0.7 | |
alt-n | mdaemon | 6.5.0 | |
alt-n | mdaemon | 6.5.1 | |
alt-n | mdaemon | 6.5.2 | |
alt-n | mdaemon | 6.7.5 | |
alt-n | mdaemon | 6.7.9 | |
alt-n | mdaemon | 6.8.0 | |
alt-n | mdaemon | 6.8.1 | |
alt-n | mdaemon | 6.8.2 | |
alt-n | mdaemon | 6.8.3 | |
alt-n | mdaemon | 6.8.4 | |
alt-n | mdaemon | 6.8.5 | |
alt-n | mdaemon | 7.2 | |
alt-n | mdaemon | 8.1.1 | |
alt-n | mdaemon | 8.1.3 | |
alt-n | mdaemon | 8.1.4 | |
alt-n | mdaemon | 9.0.1 | |
alt-n | mdaemon | 9.0.2 | |
alt-n | mdaemon | 9.0.3 | |
alt-n | mdaemon | 9.0.4 | |
alt-n | mdaemon | 9.0.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*", "matchCriteriaId": "050AC344-C537-473A-B1C7-286C4DFCC34A", "versionEndIncluding": "9.50", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "7503CBFE-B6F8-457E-BA78-16414EE14789", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*", "matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*", "matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*", "matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*", "matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DAC727D-046D-4021-BAE8-6CAD7890FEDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "01B10DB1-1E18-4B58-B1E4-6A09871100CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "63A828E9-31AF-4199-9642-583830A1F180", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "F5F58E3A-8C0C-43C4-BAF3-05DD4DDC81C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "437D2888-340C-48AB-815E-C04E5DE44CAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "46604A07-FBB0-4111-8B1C-2D01086BBB71", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "3AD17AD0-27FE-49F5-A23D-2DE672D87C17", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB9AF729-E2FA-4703-86AB-AD7416BD6EBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "72594AA0-3CB8-4F87-B709-F81E18D2ECBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "50D5F6E0-2047-4531-8C01-D79D3AE69170", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "9CEAB790-561D-4815-99E0-78B62294B54E", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "20CB70E2-1E3A-4FC1-BD26-E22EAC68D874", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks." }, { "lang": "es", "value": "M\u00faltiples vulnerabildiades no especificas en MDaemon y WorldClient en Alt-N Technologies MDaemon anteriores a 9.50 permite a un atacante remoto provocar denegaci\u00f3n de servicio (cosumo de memoria) a trav\u00e9s de vectores no especificados resultado de filtros de memoria." } ], "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nAlt-N Technologies, MDaemon, 9.50", "id": "CVE-2006-5708", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2006-11-04T01:07:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2001-02-12 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Webconfig, IMAP, and other services in MDaemon 3.5.0 and earlier allows remote attackers to cause a denial of service via a long URL terminated by a "\r\n" string.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2000-12/0315.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/2134 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2000-12/0315.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/2134 | Exploit, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Webconfig, IMAP, and other services in MDaemon 3.5.0 and earlier allows remote attackers to cause a denial of service via a long URL terminated by a \"\\r\\n\" string." } ], "id": "CVE-2001-0064", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-02-12T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0315.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2134" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-02-28 11:02
Modified
2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers." } ], "id": "CVE-2006-0925", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-02-28T11:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18921" }, { "source": "cve@mitre.org", "url": "http://www.nsag.ru/vuln/888.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16854" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0729" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/18921" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nsag.ru/vuln/888.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16854" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple buffer overflows in MDaemon 6.5.1 allow remote attackers to cause a denial of service (application crash) via a long (1) SAML, SOML, SEND, or MAIL command to the SMTP server or (2) LIST command to the IMAP server.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DAC727D-046D-4021-BAE8-6CAD7890FEDE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in MDaemon 6.5.1 allow remote attackers to cause a denial of service (application crash) via a long (1) SAML, SOML, SEND, or MAIL command to the SMTP server or (2) LIST command to the IMAP server." } ], "id": "CVE-2004-1546", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026770.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109591179510781\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/10223" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/10224" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/11238" }, { "source": "cve@mitre.org", "url": "http://www.securitylab.ru/48146.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17476" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026770.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109591179510781\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/10223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/10224" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/11238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitylab.ru/48146.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17477" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-29 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "01B10DB1-1E18-4B58-B1E4-6A09871100CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "63A828E9-31AF-4199-9642-583830A1F180", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "F5F58E3A-8C0C-43C4-BAF3-05DD4DDC81C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "437D2888-340C-48AB-815E-C04E5DE44CAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "46604A07-FBB0-4111-8B1C-2D01086BBB71", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "3AD17AD0-27FE-49F5-A23D-2DE672D87C17", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi." } ], "id": "CVE-2003-1200", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-29T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://hat-squad.com/bugreport/mdaemon-raw.txt" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=107936753929354\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/10512" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.osvdb.org/3255" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/348454" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9317" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14097" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://hat-squad.com/bugreport/mdaemon-raw.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=107936753929354\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/10512" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.osvdb.org/3255" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/348454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9317" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14097" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-03-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service via long (1) DELE or (2) UIDL arguments.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2002-10/0382.html | Exploit, Vendor Advisory | |
cve@mitre.org | http://www.iss.net/security_center/static/10488.php | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/6053 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2002-10/0382.html | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/10488.php | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/6053 | Exploit, Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service via long (1) DELE or (2) UIDL arguments." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en MDaemon POP server 6.0.7 y anteriores, permite a usuarios remotos autentificados causar la Denegaci\u00f3n de Servicios (DoS) mediante argumentos DELE o UIDL largos." } ], "id": "CVE-2002-1539", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-03-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0382.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10488.php" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6053" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0382.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10488.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6053" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-12-11 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Heap overflow in Worldclient in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap overflow in Worldclient in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL." } ], "id": "CVE-2000-1020", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-12-11T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=96925269716274\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1689" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=96925269716274\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5250" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-02-12 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
MDaemon Pro 3.5.1 and earlier allows local users to bypass the "lock server" security setting by pressing the Cancel button at the password prompt, then pressing the enter key.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MDaemon Pro 3.5.1 and earlier allows local users to bypass the \"lock server\" security setting by pressing the Cancel button at the password prompt, then pressing the enter key." } ], "id": "CVE-2001-0104", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-02-12T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/151156" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2115" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/151156" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5763" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in WorldClient.cgi in WorldClient in Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to execute arbitrary code via a long folder name (NewFolder parameter).
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*", "matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:5.0:*:pro:*:*:*:*:*", "matchCriteriaId": "B12B5202-F814-4962-A09E-44B9C075FF1F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in WorldClient.cgi in WorldClient in Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to execute arbitrary code via a long folder name (NewFolder parameter)." } ], "id": "CVE-2002-1740", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://online.securityfocus.com/archive/1/271374" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/4689" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9026" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://online.securityfocus.com/archive/1/271374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/4689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9026" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-06-16 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Race condition in MDaemon 2.8.5.0 POP server allows local users to cause a denial of service by entering a UIDL command and quickly exiting the server.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in MDaemon 2.8.5.0 POP server allows local users to cause a denial of service by entering a UIDL command and quickly exiting the server." } ], "id": "CVE-2000-0501", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-06-16T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0277.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/1366" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4745" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0277.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/1366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4745" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Alt-N Technologies MDaemon 5.0.5.0 and earlier creates a default MDaemon mail account with a password of MServer, which could allow remote attackers to send anonymous email.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*", "matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Alt-N Technologies MDaemon 5.0.5.0 and earlier creates a default MDaemon mail account with a password of MServer, which could allow remote attackers to send anonymous email." } ], "id": "CVE-2002-1738", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://online.securityfocus.com/archive/1/271374" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/4685" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://online.securityfocus.com/archive/1/271374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/4685" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9024" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-08-27 02:04
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
alt-n | mdaemon | 2.8 | |
alt-n | mdaemon | 2.8.5.0 | |
alt-n | mdaemon | 2.71_sp1 | |
alt-n | mdaemon | 3.0.3 | |
alt-n | mdaemon | 3.0.4 | |
alt-n | mdaemon | 3.1.1 | |
alt-n | mdaemon | 3.1.2 | |
alt-n | mdaemon | 3.1_beta | |
alt-n | mdaemon | 3.5.0 | |
alt-n | mdaemon | 3.5.1 | |
alt-n | mdaemon | 3.5.4 | |
alt-n | mdaemon | 3.5.4 | |
alt-n | mdaemon | 3.5.4 | |
alt-n | mdaemon | 3.5.6 | |
alt-n | mdaemon | 5.0 | |
alt-n | mdaemon | 5.0 | |
alt-n | mdaemon | 5.0.1 | |
alt-n | mdaemon | 5.0.2 | |
alt-n | mdaemon | 5.0.3 | |
alt-n | mdaemon | 5.0.4 | |
alt-n | mdaemon | 5.0.5 | |
alt-n | mdaemon | 5.0.6 | |
alt-n | mdaemon | 5.0.7 | |
alt-n | mdaemon | 6.0 | |
alt-n | mdaemon | 6.0.5 | |
alt-n | mdaemon | 6.0.6 | |
alt-n | mdaemon | 6.0.7 | |
alt-n | mdaemon | 6.5.0 | |
alt-n | mdaemon | 6.5.1 | |
alt-n | mdaemon | 6.5.2 | |
alt-n | mdaemon | 6.7.5 | |
alt-n | mdaemon | 6.7.9 | |
alt-n | mdaemon | 6.8.0 | |
alt-n | mdaemon | 6.8.1 | |
alt-n | mdaemon | 6.8.2 | |
alt-n | mdaemon | 6.8.3 | |
alt-n | mdaemon | 6.8.4 | |
alt-n | mdaemon | 6.8.5 | |
alt-n | mdaemon | 7.2 | |
alt-n | mdaemon | 8.1.1 | |
alt-n | mdaemon | 8.1.3 | |
alt-n | mdaemon | 8.1.4 | |
alt-n | mdaemon | 9.0.1 | |
alt-n | mdaemon | 9.0.2 | |
alt-n | mdaemon | 9.0.3 | |
alt-n | mdaemon | 9.0.4 | |
alt-n | mdaemon | 9.0.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "7503CBFE-B6F8-457E-BA78-16414EE14789", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*", "matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*", "matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*", "matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*", "matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DAC727D-046D-4021-BAE8-6CAD7890FEDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "01B10DB1-1E18-4B58-B1E4-6A09871100CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "63A828E9-31AF-4199-9642-583830A1F180", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "F5F58E3A-8C0C-43C4-BAF3-05DD4DDC81C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "437D2888-340C-48AB-815E-C04E5DE44CAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "46604A07-FBB0-4111-8B1C-2D01086BBB71", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "3AD17AD0-27FE-49F5-A23D-2DE672D87C17", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB9AF729-E2FA-4703-86AB-AD7416BD6EBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "72594AA0-3CB8-4F87-B709-F81E18D2ECBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "50D5F6E0-2047-4531-8C01-D79D3AE69170", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "9CEAB790-561D-4815-99E0-78B62294B54E", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "20CB70E2-1E3A-4FC1-BD26-E22EAC68D874", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain \u0027@\u0027 characters in the (1) USER and (2) APOP commands." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en el servidor POP3 de Alt-N Technologies MDaemon anterior a 9.0.6 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante cadenas largas que contienen caracteres \u0027@\u0027 en los comandos (1) USER y (2) APOP." } ], "id": "CVE-2006-4364", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-08-27T02:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21595" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/1446" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016729" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/28125" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/19651" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3361" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/2245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/1446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/28125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/19651" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/2245" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-05-24 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in MDaemon POP server allows remote attackers to cause a denial of service via a long user name.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*", "matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in MDaemon POP server allows remote attackers to cause a denial of service via a long user name." } ], "id": "CVE-2000-0399", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-05-24T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0301.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/1250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0301.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/1250" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-15 11:03
Modified
2025-04-03 01:03
Severity ?
Summary
WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
alt-n | mdaemon | 8.1.3 | |
alt-n | worldclient | 8.1.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:worldclient:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "BB67A240-BF23-4B74-944D-127B263154E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value." } ], "id": "CVE-2005-4266", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-15T11:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17990" }, { "source": "cve@mitre.org", "url": "http://www.ipomonis.com/advisories/mdaemon.zip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ipomonis.com/advisories/mdaemon.zip" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in Alt-N MDaemon 7.0.1 allows remote attackers to cause a denial of service (application crash) via a long STATUS command to the IMAP server.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
alt-n | mdaemon | 2.8 | |
alt-n | mdaemon | 2.8.5.0 | |
alt-n | mdaemon | 2.71_sp1 | |
alt-n | mdaemon | 3.0.3 | |
alt-n | mdaemon | 3.0.4 | |
alt-n | mdaemon | 3.1.1 | |
alt-n | mdaemon | 3.1.2 | |
alt-n | mdaemon | 3.1_beta | |
alt-n | mdaemon | 3.5.0 | |
alt-n | mdaemon | 3.5.1 | |
alt-n | mdaemon | 3.5.4 | |
alt-n | mdaemon | 3.5.6 | |
alt-n | mdaemon | 5.0.7 | |
alt-n | mdaemon | 6.0 | |
alt-n | mdaemon | 6.0.5 | |
alt-n | mdaemon | 6.0.6 | |
alt-n | mdaemon | 6.0.7 | |
alt-n | mdaemon | 6.5.0 | |
alt-n | mdaemon | 6.5.2 | |
alt-n | mdaemon | 6.7.5 | |
alt-n | mdaemon | 6.7.9 | |
alt-n | mdaemon | 6.8.0 | |
alt-n | mdaemon | 6.8.1 | |
alt-n | mdaemon | 6.8.2 | |
alt-n | mdaemon | 6.8.3 | |
alt-n | mdaemon | 6.8.4 | |
alt-n | mdaemon | 6.8.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "7503CBFE-B6F8-457E-BA78-16414EE14789", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*", "matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "01B10DB1-1E18-4B58-B1E4-6A09871100CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "63A828E9-31AF-4199-9642-583830A1F180", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "F5F58E3A-8C0C-43C4-BAF3-05DD4DDC81C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "437D2888-340C-48AB-815E-C04E5DE44CAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "46604A07-FBB0-4111-8B1C-2D01086BBB71", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "3AD17AD0-27FE-49F5-A23D-2DE672D87C17", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Alt-N MDaemon 7.0.1 allows remote attackers to cause a denial of service (application crash) via a long STATUS command to the IMAP server." } ], "id": "CVE-2004-2292", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0527.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/10366" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0527.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/10366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16118" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "63A828E9-31AF-4199-9642-583830A1F180", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name." } ], "id": "CVE-2003-1470", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3296" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/archive/1/319879" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/7446" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/archive/1/319879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/7446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-05-30 10:02
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a '"' (double quote).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
alt-n | mdaemon | 2.8 | |
alt-n | mdaemon | 2.8.5.0 | |
alt-n | mdaemon | 3.0.3 | |
alt-n | mdaemon | 3.0.4 | |
alt-n | mdaemon | 3.1.1 | |
alt-n | mdaemon | 3.1.2 | |
alt-n | mdaemon | 3.1_beta | |
alt-n | mdaemon | 3.5.0 | |
alt-n | mdaemon | 3.5.1 | |
alt-n | mdaemon | 3.5.4 | |
alt-n | mdaemon | 3.5.4 | |
alt-n | mdaemon | 3.5.4 | |
alt-n | mdaemon | 3.5.6 | |
alt-n | mdaemon | 5.0 | |
alt-n | mdaemon | 5.0 | |
alt-n | mdaemon | 5.0.1 | |
alt-n | mdaemon | 5.0.2 | |
alt-n | mdaemon | 5.0.3 | |
alt-n | mdaemon | 5.0.4 | |
alt-n | mdaemon | 5.0.5 | |
alt-n | mdaemon | 5.0.6 | |
alt-n | mdaemon | 5.0.7 | |
alt-n | mdaemon | 6.0 | |
alt-n | mdaemon | 6.0.5 | |
alt-n | mdaemon | 6.0.6 | |
alt-n | mdaemon | 6.0.7 | |
alt-n | mdaemon | 6.5.0 | |
alt-n | mdaemon | 6.5.1 | |
alt-n | mdaemon | 6.5.2 | |
alt-n | mdaemon | 6.7.5 | |
alt-n | mdaemon | 6.7.9 | |
alt-n | mdaemon | 6.8.0 | |
alt-n | mdaemon | 6.8.1 | |
alt-n | mdaemon | 6.8.2 | |
alt-n | mdaemon | 6.8.3 | |
alt-n | mdaemon | 6.8.4 | |
alt-n | mdaemon | 6.8.5 | |
alt-n | mdaemon | 7.2 | |
alt-n | mdaemon | 8.1.1 | |
alt-n | mdaemon | 8.1.3 | |
alt-n | mdaemon | 8.1.4 | |
alt-n | mdaemon | 9.0.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*", "matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*", "matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*", "matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*", "matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DAC727D-046D-4021-BAE8-6CAD7890FEDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "01B10DB1-1E18-4B58-B1E4-6A09871100CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "63A828E9-31AF-4199-9642-583830A1F180", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "F5F58E3A-8C0C-43C4-BAF3-05DD4DDC81C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "437D2888-340C-48AB-815E-C04E5DE44CAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "46604A07-FBB0-4111-8B1C-2D01086BBB71", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "3AD17AD0-27FE-49F5-A23D-2DE672D87C17", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19", "vulnerable": true }, { "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB9AF729-E2FA-4703-86AB-AD7416BD6EBE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a \u0027\"\u0027 (double quote)." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Alt-N MDaemon, posiblemente 9.0.1 y versiones anteriores, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un argumento A0001 largo que comienza con un \u0027\"\u0027 (comillas dobles)." } ], "id": "CVE-2006-2646", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-05-30T10:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://securitytracker.com/id?1016167" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/18129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://securitytracker.com/id?1016167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/18129" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }