Search criteria

86 vulnerabilities found for mdaemon by alt-n

FKIE_CVE-2008-6967

Vulnerability from fkie_nvd - Published: 2009-08-13 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E29B9A0-41DA-48C6-9CCE-746256C18D02",
              "versionEndIncluding": "10.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7503CBFE-B6F8-457E-BA78-16414EE14789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*",
              "matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*",
              "matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB9AF729-E2FA-4703-86AB-AD7416BD6EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "72594AA0-3CB8-4F87-B709-F81E18D2ECBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D5F6E0-2047-4531-8C01-D79D3AE69170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CEAB790-561D-4815-99E0-78B62294B54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20CB70E2-1E3A-4FC1-BD26-E22EAC68D874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8AC4F7-CADE-448D-82C6-C4D19EAAADFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A93052-5501-431A-B6E5-7C0574C66C63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5CE884A-B10D-4E2F-B020-92C2CB2CAE02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF4AD8B6-940B-445F-83EE-77379CFF36DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3610BC-6E11-437F-B7DF-3FEC2812BBC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "B578384C-73DA-4D2A-8A5D-5293391A3172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "964F316B-E449-49BA-8FF6-343D20AA7716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "315E7C89-460E-4A0F-89B9-9228DCC1EF00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:worldclient:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF20F74D-1767-411D-9474-F2597293E1F1",
              "versionEndIncluding": "10.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:worldclient:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D4C366-2A06-4D1E-AC25-368CFA4D2305",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:worldclient:2.1:*:standard:*:*:*:*:*",
              "matchCriteriaId": "27A288FA-8810-4615-B2AD-E595FEDA3A66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:worldclient:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "97FD2E84-B802-4BDA-A39B-D84F67ABC21C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:worldclient:5.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "B12B5202-F814-4962-A09E-44B9C075FF1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:worldclient:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9343C918-6C63-4EE7-9B30-30C1209041C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:worldclient:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AE088E-E03F-4BB0-8A5B-ED2734B3B0D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:worldclient:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DFD683F-21E3-49CA-B22A-40FA79FECF57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:worldclient:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC30F32-5C76-4D1A-979D-949D0C1DC39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:worldclient:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4FAD806-A5CE-46D5-AD59-13F364F988EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:worldclient:8.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB67A240-BF23-4B74-944D-127B263154E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidad no especificada en WorldClient en Alt-N MDaemon anteriores a v10.02 tienen impacto desconocido y vector de ataque, probablemente relativo a de ejecuci\u00f3n de secuencias de comandos en sitios cruzados - XSS - WorldClient DLL v10.0.1, una vulnerabilidad diferente que CVE-2008-6893."
    }
  ],
  "id": "CVE-2008-6967",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-08-13T16:30:01.077",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/50011"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32142"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/32355"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/3206"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/50011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32142"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/32355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/3206"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-3622

Vulnerability from fkie_nvd - Published: 2007-07-09 16:30 - Updated: 2025-04-09 00:30

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8495C07-40E4-45D2-B7CE-F5BEBC6CEBA7",
              "versionEndIncluding": "9.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en DomainPOP en Alt-N Technologies MDaemon anterior a 9.61 permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida) a trav\u00e9s de mensajes malformados."
    }
  ],
  "id": "CVE-2007-3622",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-07-09T16:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37193"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25968"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24787"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018342"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37193"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25968"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24787"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018342"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-5968

Vulnerability from fkie_nvd - Published: 2006-11-17 22:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions.
Impacted products
Vendor Product Version
alt-n mdaemon 9.0.5
alt-n mdaemon 9.0.6
alt-n mdaemon 9.51
alt-n mdaemon 9.53

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20CB70E2-1E3A-4FC1-BD26-E22EAC68D874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8AC4F7-CADE-448D-82C6-C4D19EAAADFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3610BC-6E11-437F-B7DF-3FEC2812BBC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "B578384C-73DA-4D2A-8A5D-5293391A3172",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\\APP folder, which is an untrusted search path element due to insecure permissions."
    },
    {
      "lang": "es",
      "value": "MDaemon 9.0.5, 9.0.6, 9.51, y 9.53, y posiblemente otras versiones, instalan la carpeta de la aplicaci\u00f3n MDaemon con permisos no seguros (los usuarios crean ficheros/directorios), lo cual permite a un usuario local ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de la creacion de c\u00f3digo malicioso de las librerias RASAPI32.DLL o MPRAPI.DLL en la carpeta MDaemon\\APP, lo cual no es una carpeta de b\u00fasqueda correcta debido a lo permisos poco seguros."
    }
  ],
  "id": "CVE-2006-5968",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-11-17T22:07:00.000",
  "references": [
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/21554"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-67/advisory/"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://securityreason.com/securityalert/1890"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://securitytracker.com/id?1017238"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2006/4538"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21554"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-67/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/1890"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/4538"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
    }
  ],
  "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-5709

Vulnerability from fkie_nvd - Published: 2006-11-04 01:07 - Updated: 2025-04-09 00:30

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E380CE-3453-46AF-BDEE-3AB04997E5A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a \"JavaScript exploit.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en WorldClient de Alt-N Technologies MDaemon versiones anteriores a 9.50 tiene un impacto desconocido y vectores de ataque referidos a \"JavaScript exploit.\""
    }
  ],
  "id": "CVE-2006-5709",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-11-04T01:07:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22507"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/4251"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/4251"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-5708

Vulnerability from fkie_nvd - Published: 2006-11-04 01:07 - Updated: 2025-04-09 00:30
Summary
Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks.
Impacted products
Vendor Product Version
alt-n mdaemon *
alt-n mdaemon 2.8
alt-n mdaemon 2.8.5.0
alt-n mdaemon 2.71_sp1
alt-n mdaemon 3.0.3
alt-n mdaemon 3.0.4
alt-n mdaemon 3.1.1
alt-n mdaemon 3.1.2
alt-n mdaemon 3.1_beta
alt-n mdaemon 3.5.0
alt-n mdaemon 3.5.1
alt-n mdaemon 3.5.4
alt-n mdaemon 3.5.4
alt-n mdaemon 3.5.4
alt-n mdaemon 3.5.6
alt-n mdaemon 5.0
alt-n mdaemon 5.0
alt-n mdaemon 5.0.1
alt-n mdaemon 5.0.2
alt-n mdaemon 5.0.3
alt-n mdaemon 5.0.4
alt-n mdaemon 5.0.5
alt-n mdaemon 5.0.6
alt-n mdaemon 5.0.7
alt-n mdaemon 6.0
alt-n mdaemon 6.0.5
alt-n mdaemon 6.0.6
alt-n mdaemon 6.0.7
alt-n mdaemon 6.5.0
alt-n mdaemon 6.5.1
alt-n mdaemon 6.5.2
alt-n mdaemon 6.7.5
alt-n mdaemon 6.7.9
alt-n mdaemon 6.8.0
alt-n mdaemon 6.8.1
alt-n mdaemon 6.8.2
alt-n mdaemon 6.8.3
alt-n mdaemon 6.8.4
alt-n mdaemon 6.8.5
alt-n mdaemon 7.2
alt-n mdaemon 8.1.1
alt-n mdaemon 8.1.3
alt-n mdaemon 8.1.4
alt-n mdaemon 9.0.1
alt-n mdaemon 9.0.2
alt-n mdaemon 9.0.3
alt-n mdaemon 9.0.4
alt-n mdaemon 9.0.5

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "050AC344-C537-473A-B1C7-286C4DFCC34A",
              "versionEndIncluding": "9.50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7503CBFE-B6F8-457E-BA78-16414EE14789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*",
              "matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*",
              "matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DAC727D-046D-4021-BAE8-6CAD7890FEDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B10DB1-1E18-4B58-B1E4-6A09871100CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A828E9-31AF-4199-9642-583830A1F180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5F58E3A-8C0C-43C4-BAF3-05DD4DDC81C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D2888-340C-48AB-815E-C04E5DE44CAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "46604A07-FBB0-4111-8B1C-2D01086BBB71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AD17AD0-27FE-49F5-A23D-2DE672D87C17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB9AF729-E2FA-4703-86AB-AD7416BD6EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "72594AA0-3CB8-4F87-B709-F81E18D2ECBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D5F6E0-2047-4531-8C01-D79D3AE69170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CEAB790-561D-4815-99E0-78B62294B54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20CB70E2-1E3A-4FC1-BD26-E22EAC68D874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabildiades no especificas en MDaemon y WorldClient en Alt-N Technologies MDaemon anteriores a 9.50 permite a un atacante remoto provocar denegaci\u00f3n de servicio (cosumo de memoria) a trav\u00e9s de vectores no especificados resultado de filtros de memoria."
    }
  ],
  "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nAlt-N Technologies, MDaemon, 9.50",
  "id": "CVE-2006-5708",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2006-11-04T01:07:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2006-4364

Vulnerability from fkie_nvd - Published: 2006-08-27 02:04 - Updated: 2025-04-03 01:03
Severity ?
Summary
Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands.
References
cve@mitre.orghttp://files.altn.com/MDaemon/Release/RelNotes_en.txt
cve@mitre.orghttp://secunia.com/advisories/21595Patch, Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/1446
cve@mitre.orghttp://securitytracker.com/id?1016729
cve@mitre.orghttp://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04Exploit
cve@mitre.orghttp://www.osvdb.org/28125
cve@mitre.orghttp://www.securityfocus.com/archive/1/444015/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/19651Exploit
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3361
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/28517
cve@mitre.orghttps://www.exploit-db.com/exploits/2245
af854a3a-2127-422b-91ae-364da2661108http://files.altn.com/MDaemon/Release/RelNotes_en.txt
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21595Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/1446
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016729
af854a3a-2127-422b-91ae-364da2661108http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/28125
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/444015/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19651Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3361
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28517
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/2245
Impacted products
Vendor Product Version
alt-n mdaemon 2.8
alt-n mdaemon 2.8.5.0
alt-n mdaemon 2.71_sp1
alt-n mdaemon 3.0.3
alt-n mdaemon 3.0.4
alt-n mdaemon 3.1.1
alt-n mdaemon 3.1.2
alt-n mdaemon 3.1_beta
alt-n mdaemon 3.5.0
alt-n mdaemon 3.5.1
alt-n mdaemon 3.5.4
alt-n mdaemon 3.5.4
alt-n mdaemon 3.5.4
alt-n mdaemon 3.5.6
alt-n mdaemon 5.0
alt-n mdaemon 5.0
alt-n mdaemon 5.0.1
alt-n mdaemon 5.0.2
alt-n mdaemon 5.0.3
alt-n mdaemon 5.0.4
alt-n mdaemon 5.0.5
alt-n mdaemon 5.0.6
alt-n mdaemon 5.0.7
alt-n mdaemon 6.0
alt-n mdaemon 6.0.5
alt-n mdaemon 6.0.6
alt-n mdaemon 6.0.7
alt-n mdaemon 6.5.0
alt-n mdaemon 6.5.1
alt-n mdaemon 6.5.2
alt-n mdaemon 6.7.5
alt-n mdaemon 6.7.9
alt-n mdaemon 6.8.0
alt-n mdaemon 6.8.1
alt-n mdaemon 6.8.2
alt-n mdaemon 6.8.3
alt-n mdaemon 6.8.4
alt-n mdaemon 6.8.5
alt-n mdaemon 7.2
alt-n mdaemon 8.1.1
alt-n mdaemon 8.1.3
alt-n mdaemon 8.1.4
alt-n mdaemon 9.0.1
alt-n mdaemon 9.0.2
alt-n mdaemon 9.0.3
alt-n mdaemon 9.0.4
alt-n mdaemon 9.0.5

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7503CBFE-B6F8-457E-BA78-16414EE14789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*",
              "matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*",
              "matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DAC727D-046D-4021-BAE8-6CAD7890FEDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B10DB1-1E18-4B58-B1E4-6A09871100CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A828E9-31AF-4199-9642-583830A1F180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5F58E3A-8C0C-43C4-BAF3-05DD4DDC81C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D2888-340C-48AB-815E-C04E5DE44CAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "46604A07-FBB0-4111-8B1C-2D01086BBB71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AD17AD0-27FE-49F5-A23D-2DE672D87C17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB9AF729-E2FA-4703-86AB-AD7416BD6EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "72594AA0-3CB8-4F87-B709-F81E18D2ECBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D5F6E0-2047-4531-8C01-D79D3AE69170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CEAB790-561D-4815-99E0-78B62294B54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20CB70E2-1E3A-4FC1-BD26-E22EAC68D874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain \u0027@\u0027 characters in the (1) USER and (2) APOP commands."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer en el servidor POP3 de Alt-N Technologies MDaemon anterior a 9.0.6 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante cadenas largas que contienen caracteres \u0027@\u0027 en los comandos (1) USER y (2) APOP."
    }
  ],
  "id": "CVE-2006-4364",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-27T02:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21595"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/1446"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016729"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/28125"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/19651"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3361"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/2245"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/1446"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/28125"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/19651"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3361"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/2245"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-2646

Vulnerability from fkie_nvd - Published: 2006-05-30 10:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a '"' (double quote).
Impacted products
Vendor Product Version
alt-n mdaemon 2.8
alt-n mdaemon 2.8.5.0
alt-n mdaemon 3.0.3
alt-n mdaemon 3.0.4
alt-n mdaemon 3.1.1
alt-n mdaemon 3.1.2
alt-n mdaemon 3.1_beta
alt-n mdaemon 3.5.0
alt-n mdaemon 3.5.1
alt-n mdaemon 3.5.4
alt-n mdaemon 3.5.4
alt-n mdaemon 3.5.4
alt-n mdaemon 3.5.6
alt-n mdaemon 5.0
alt-n mdaemon 5.0
alt-n mdaemon 5.0.1
alt-n mdaemon 5.0.2
alt-n mdaemon 5.0.3
alt-n mdaemon 5.0.4
alt-n mdaemon 5.0.5
alt-n mdaemon 5.0.6
alt-n mdaemon 5.0.7
alt-n mdaemon 6.0
alt-n mdaemon 6.0.5
alt-n mdaemon 6.0.6
alt-n mdaemon 6.0.7
alt-n mdaemon 6.5.0
alt-n mdaemon 6.5.1
alt-n mdaemon 6.5.2
alt-n mdaemon 6.7.5
alt-n mdaemon 6.7.9
alt-n mdaemon 6.8.0
alt-n mdaemon 6.8.1
alt-n mdaemon 6.8.2
alt-n mdaemon 6.8.3
alt-n mdaemon 6.8.4
alt-n mdaemon 6.8.5
alt-n mdaemon 7.2
alt-n mdaemon 8.1.1
alt-n mdaemon 8.1.3
alt-n mdaemon 8.1.4
alt-n mdaemon 9.0.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*",
              "matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*",
              "matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*",
              "matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DAC727D-046D-4021-BAE8-6CAD7890FEDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B10DB1-1E18-4B58-B1E4-6A09871100CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A828E9-31AF-4199-9642-583830A1F180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5F58E3A-8C0C-43C4-BAF3-05DD4DDC81C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "437D2888-340C-48AB-815E-C04E5DE44CAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "46604A07-FBB0-4111-8B1C-2D01086BBB71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AD17AD0-27FE-49F5-A23D-2DE672D87C17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB9AF729-E2FA-4703-86AB-AD7416BD6EBE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a \u0027\"\u0027 (double quote)."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en Alt-N MDaemon, posiblemente 9.0.1 y versiones anteriores, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un argumento A0001 largo que comienza con un \u0027\"\u0027 (comillas dobles)."
    }
  ],
  "id": "CVE-2006-2646",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-05-30T10:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://securitytracker.com/id?1016167"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/18129"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://securitytracker.com/id?1016167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/18129"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-0925

Vulnerability from fkie_nvd - Published: 2006-02-28 11:02 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers."
    }
  ],
  "id": "CVE-2006-0925",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-02-28T11:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18921"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.nsag.ru/vuln/888.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/16854"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/0729"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18921"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.nsag.ru/vuln/888.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/16854"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/0729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-4266

Vulnerability from fkie_nvd - Published: 2005-12-15 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value.
Impacted products
Vendor Product Version
alt-n mdaemon 8.1.3
alt-n worldclient 8.1.3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alt-n:worldclient:8.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB67A240-BF23-4B74-944D-127B263154E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value."
    }
  ],
  "id": "CVE-2005-4266",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-15T11:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17990"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ipomonis.com/advisories/mdaemon.zip"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17990"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ipomonis.com/advisories/mdaemon.zip"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2008-6967 (GCVE-0-2008-6967)

Vulnerability from cvelistv5 – Published: 2009-08-13 16:00 – Updated: 2024-08-07 11:49
VLAI?
Summary
Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2008/3206 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/32142 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://files.altn.com/MDaemon/Release/RelNotes_en.txt x_refsource_CONFIRM
http://osvdb.org/50011 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/32355 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:49:02.503Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-3206",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3206"
          },
          {
            "name": "32142",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32142"
          },
          {
            "name": "worldclient-html-xss(46688)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
          },
          {
            "name": "50011",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/50011"
          },
          {
            "name": "32355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32355"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-11-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2008-3206",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3206"
        },
        {
          "name": "32142",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32142"
        },
        {
          "name": "worldclient-html-xss(46688)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
        },
        {
          "name": "50011",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/50011"
        },
        {
          "name": "32355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32355"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-6967",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-3206",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3206"
            },
            {
              "name": "32142",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32142"
            },
            {
              "name": "worldclient-html-xss(46688)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
            },
            {
              "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
              "refsource": "CONFIRM",
              "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
            },
            {
              "name": "50011",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/50011"
            },
            {
              "name": "32355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32355"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-6967",
    "datePublished": "2009-08-13T16:00:00",
    "dateReserved": "2009-08-13T00:00:00",
    "dateUpdated": "2024-08-07T11:49:02.503Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-1470 (GCVE-0-2003-1470)

Vulnerability from cvelistv5 – Published: 2007-10-24 23:00 – Updated: 2024-08-08 02:28
VLAI?
Summary
Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/7446 vdb-entryx_refsource_BID
http://securityreason.com/securityalert/3296 third-party-advisoryx_refsource_SREASON
http://www.securityfocus.com/archive/1/319879 mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:28:03.647Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "7446",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/7446"
          },
          {
            "name": "3296",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3296"
          },
          {
            "name": "20030427 MDaemon SMTP/POP/IMAP server  =\u003ev.6.7.5: IMAP buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/319879"
          },
          {
            "name": "mdaemon-imap-create-bo(11896)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-04-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "7446",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/7446"
        },
        {
          "name": "3296",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3296"
        },
        {
          "name": "20030427 MDaemon SMTP/POP/IMAP server  =\u003ev.6.7.5: IMAP buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/319879"
        },
        {
          "name": "mdaemon-imap-create-bo(11896)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-1470",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "7446",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/7446"
            },
            {
              "name": "3296",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3296"
            },
            {
              "name": "20030427 MDaemon SMTP/POP/IMAP server  =\u003ev.6.7.5: IMAP buffer overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/319879"
            },
            {
              "name": "mdaemon-imap-create-bo(11896)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-1470",
    "datePublished": "2007-10-24T23:00:00",
    "dateReserved": "2007-10-24T00:00:00",
    "dateUpdated": "2024-08-08T02:28:03.647Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-1471 (GCVE-0-2003-1471)

Vulnerability from cvelistv5 – Published: 2007-10-24 23:00 – Updated: 2024-08-08 02:28
VLAI?
Summary
MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:28:03.612Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "mdaemon-pop3-negative-dos(11882)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882"
          },
          {
            "name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html"
          },
          {
            "name": "7445",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/7445"
          },
          {
            "name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-04-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "mdaemon-pop3-negative-dos(11882)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882"
        },
        {
          "name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html"
        },
        {
          "name": "7445",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/7445"
        },
        {
          "name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-1471",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "mdaemon-pop3-negative-dos(11882)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882"
            },
            {
              "name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html"
            },
            {
              "name": "7445",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/7445"
            },
            {
              "name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
              "refsource": "BUGTRAQ",
              "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-1471",
    "datePublished": "2007-10-24T23:00:00",
    "dateReserved": "2007-10-24T00:00:00",
    "dateUpdated": "2024-08-08T02:28:03.612Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3622 (GCVE-0-2007-3622)

Vulnerability from cvelistv5 – Published: 2007-07-09 16:00 – Updated: 2024-08-07 14:21
VLAI?
Summary
Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://osvdb.org/37193 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/25968 third-party-advisoryx_refsource_SECUNIA
http://www.securitytracker.com/id?1018342 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/24787 vdb-entryx_refsource_BID
http://files.altn.com/MDaemon/Release/RelNotes_en.txt x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:21:36.451Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "37193",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37193"
          },
          {
            "name": "25968",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25968"
          },
          {
            "name": "1018342",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018342"
          },
          {
            "name": "24787",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24787"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
          },
          {
            "name": "mdaemon-domainpop-dos(35285)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "37193",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37193"
        },
        {
          "name": "25968",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25968"
        },
        {
          "name": "1018342",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018342"
        },
        {
          "name": "24787",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24787"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
        },
        {
          "name": "mdaemon-domainpop-dos(35285)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3622",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "37193",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37193"
            },
            {
              "name": "25968",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25968"
            },
            {
              "name": "1018342",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018342"
            },
            {
              "name": "24787",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24787"
            },
            {
              "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
              "refsource": "CONFIRM",
              "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
            },
            {
              "name": "mdaemon-domainpop-dos(35285)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3622",
    "datePublished": "2007-07-09T16:00:00",
    "dateReserved": "2007-07-09T00:00:00",
    "dateUpdated": "2024-08-07T14:21:36.451Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5968 (GCVE-0-2006-5968)

Vulnerability from cvelistv5 – Published: 2006-11-17 22:00 – Updated: 2024-08-07 20:12
VLAI?
Summary
MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/secunia_research/2006-67/advisory/ x_refsource_MISC
http://www.vupen.com/english/advisories/2006/4538 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/451821/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/21554 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://securityreason.com/securityalert/1890 third-party-advisoryx_refsource_SREASON
http://securitytracker.com/id?1017238 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:12:31.178Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-67/advisory/"
          },
          {
            "name": "ADV-2006-4538",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4538"
          },
          {
            "name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
          },
          {
            "name": "21554",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21554"
          },
          {
            "name": "mdaemon-folder-privilege-escalation(30331)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
          },
          {
            "name": "1890",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1890"
          },
          {
            "name": "1017238",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017238"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\\APP folder, which is an untrusted search path element due to insecure permissions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
        "shortName": "flexera"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-67/advisory/"
        },
        {
          "name": "ADV-2006-4538",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4538"
        },
        {
          "name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
        },
        {
          "name": "21554",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21554"
        },
        {
          "name": "mdaemon-folder-privilege-escalation(30331)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
        },
        {
          "name": "1890",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1890"
        },
        {
          "name": "1017238",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017238"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
          "ID": "CVE-2006-5968",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\\APP folder, which is an untrusted search path element due to insecure permissions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://secunia.com/secunia_research/2006-67/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-67/advisory/"
            },
            {
              "name": "ADV-2006-4538",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4538"
            },
            {
              "name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
            },
            {
              "name": "21554",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21554"
            },
            {
              "name": "mdaemon-folder-privilege-escalation(30331)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
            },
            {
              "name": "1890",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1890"
            },
            {
              "name": "1017238",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017238"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
    "assignerShortName": "flexera",
    "cveId": "CVE-2006-5968",
    "datePublished": "2006-11-17T22:00:00",
    "dateReserved": "2006-11-17T00:00:00",
    "dateUpdated": "2024-08-07T20:12:31.178Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5709 (GCVE-0-2006-5709)

Vulnerability from cvelistv5 – Published: 2006-11-04 01:00 – Updated: 2024-08-07 20:04
VLAI?
Summary
Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a "JavaScript exploit."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:04:54.289Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "22507",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22507"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
          },
          {
            "name": "ADV-2006-4251",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4251"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a \"JavaScript exploit.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "22507",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22507"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
        },
        {
          "name": "ADV-2006-4251",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4251"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5709",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a \"JavaScript exploit.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "22507",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22507"
            },
            {
              "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
              "refsource": "CONFIRM",
              "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
            },
            {
              "name": "ADV-2006-4251",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4251"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5709",
    "datePublished": "2006-11-04T01:00:00",
    "dateReserved": "2006-11-03T00:00:00",
    "dateUpdated": "2024-08-07T20:04:54.289Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5708 (GCVE-0-2006-5708)

Vulnerability from cvelistv5 – Published: 2006-11-04 01:00 – Updated: 2025-04-03 15:26
VLAI?
Summary
Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:04:54.460Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2006-5708",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-03T15:25:25.541724Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-400",
                "description": "CWE-400 Uncontrolled Resource Consumption",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-03T15:26:14.870Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-11-04T01:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
              "refsource": "CONFIRM",
              "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5708",
    "datePublished": "2006-11-04T01:00:00.000Z",
    "dateReserved": "2006-11-03T00:00:00.000Z",
    "dateUpdated": "2025-04-03T15:26:14.870Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4364 (GCVE-0-2006-4364)

Vulnerability from cvelistv5 – Published: 2006-08-25 23:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.exploit-db.com/exploits/2245 exploitx_refsource_EXPLOIT-DB
http://securitytracker.com/id?1016729 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/3361 vdb-entryx_refsource_VUPEN
http://www.infigo.hr/en/in_focus/advisories/INFIG… x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/archive/1/444015/100… mailing-listx_refsource_BUGTRAQ
http://securityreason.com/securityalert/1446 third-party-advisoryx_refsource_SREASON
http://www.securityfocus.com/bid/19651 vdb-entryx_refsource_BID
http://files.altn.com/MDaemon/Release/RelNotes_en.txt x_refsource_CONFIRM
http://secunia.com/advisories/21595 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/28125 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:06:07.630Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2245",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/2245"
          },
          {
            "name": "1016729",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016729"
          },
          {
            "name": "ADV-2006-3361",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3361"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
          },
          {
            "name": "mdaemon-pop3-bo(28517)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
          },
          {
            "name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
          },
          {
            "name": "1446",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1446"
          },
          {
            "name": "19651",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19651"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
          },
          {
            "name": "21595",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21595"
          },
          {
            "name": "28125",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/28125"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain \u0027@\u0027 characters in the (1) USER and (2) APOP commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "2245",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/2245"
        },
        {
          "name": "1016729",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016729"
        },
        {
          "name": "ADV-2006-3361",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3361"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
        },
        {
          "name": "mdaemon-pop3-bo(28517)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
        },
        {
          "name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
        },
        {
          "name": "1446",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1446"
        },
        {
          "name": "19651",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19651"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
        },
        {
          "name": "21595",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21595"
        },
        {
          "name": "28125",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/28125"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4364",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain \u0027@\u0027 characters in the (1) USER and (2) APOP commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2245",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/2245"
            },
            {
              "name": "1016729",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016729"
            },
            {
              "name": "ADV-2006-3361",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3361"
            },
            {
              "name": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04",
              "refsource": "MISC",
              "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
            },
            {
              "name": "mdaemon-pop3-bo(28517)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
            },
            {
              "name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
            },
            {
              "name": "1446",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1446"
            },
            {
              "name": "19651",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19651"
            },
            {
              "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
              "refsource": "CONFIRM",
              "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
            },
            {
              "name": "21595",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21595"
            },
            {
              "name": "28125",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/28125"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4364",
    "datePublished": "2006-08-25T23:00:00",
    "dateReserved": "2006-08-25T00:00:00",
    "dateUpdated": "2024-08-07T19:06:07.630Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-2646 (GCVE-0-2006-2646)

Vulnerability from cvelistv5 – Published: 2006-05-30 10:00 – Updated: 2024-08-07 17:58
VLAI?
Summary
Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a '"' (double quote).
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/18129 vdb-entryx_refsource_BID
http://securitytracker.com/id?1016167 vdb-entryx_refsource_SECTRACK
http://marc.info/?l=full-disclosure&m=11488227091… mailing-listx_refsource_FULLDISC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:58:51.774Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18129",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18129"
          },
          {
            "name": "1016167",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016167"
          },
          {
            "name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a \u0027\"\u0027 (double quote)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18129",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18129"
        },
        {
          "name": "1016167",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016167"
        },
        {
          "name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2646",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a \u0027\"\u0027 (double quote)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18129",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18129"
            },
            {
              "name": "1016167",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016167"
            },
            {
              "name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2646",
    "datePublished": "2006-05-30T10:00:00",
    "dateReserved": "2006-05-30T00:00:00",
    "dateUpdated": "2024-08-07T17:58:51.774Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0925 (GCVE-0-2006-0925)

Vulnerability from cvelistv5 – Published: 2006-02-28 11:00 – Updated: 2024-08-07 16:56
VLAI?
Summary
Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/18921 third-party-advisoryx_refsource_SECUNIA
http://www.nsag.ru/vuln/888.html x_refsource_MISC
http://www.vupen.com/english/advisories/2006/0729 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/16854 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:56:13.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "mdaemon-imap-foldername-dos(24916)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
          },
          {
            "name": "18921",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18921"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nsag.ru/vuln/888.html"
          },
          {
            "name": "ADV-2006-0729",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0729"
          },
          {
            "name": "16854",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16854"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-02-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "mdaemon-imap-foldername-dos(24916)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
        },
        {
          "name": "18921",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18921"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nsag.ru/vuln/888.html"
        },
        {
          "name": "ADV-2006-0729",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0729"
        },
        {
          "name": "16854",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16854"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0925",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "mdaemon-imap-foldername-dos(24916)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
            },
            {
              "name": "18921",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18921"
            },
            {
              "name": "http://www.nsag.ru/vuln/888.html",
              "refsource": "MISC",
              "url": "http://www.nsag.ru/vuln/888.html"
            },
            {
              "name": "ADV-2006-0729",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0729"
            },
            {
              "name": "16854",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16854"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0925",
    "datePublished": "2006-02-28T11:00:00",
    "dateReserved": "2006-02-28T00:00:00",
    "dateUpdated": "2024-08-07T16:56:13.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4266 (GCVE-0-2005-4266)

Vulnerability from cvelistv5 – Published: 2005-12-15 11:00 – Updated: 2024-09-16 18:03
VLAI?
Summary
WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.ipomonis.com/advisories/mdaemon.zip x_refsource_MISC
http://secunia.com/advisories/17990 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:38:51.629Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ipomonis.com/advisories/mdaemon.zip"
          },
          {
            "name": "17990",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17990"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-12-15T11:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ipomonis.com/advisories/mdaemon.zip"
        },
        {
          "name": "17990",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17990"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4266",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ipomonis.com/advisories/mdaemon.zip",
              "refsource": "MISC",
              "url": "http://www.ipomonis.com/advisories/mdaemon.zip"
            },
            {
              "name": "17990",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17990"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4266",
    "datePublished": "2005-12-15T11:00:00Z",
    "dateReserved": "2005-12-15T00:00:00Z",
    "dateUpdated": "2024-09-16T18:03:49.820Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-6967 (GCVE-0-2008-6967)

Vulnerability from nvd – Published: 2009-08-13 16:00 – Updated: 2024-08-07 11:49
VLAI?
Summary
Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2008/3206 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/32142 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://files.altn.com/MDaemon/Release/RelNotes_en.txt x_refsource_CONFIRM
http://osvdb.org/50011 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/32355 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:49:02.503Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-3206",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3206"
          },
          {
            "name": "32142",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32142"
          },
          {
            "name": "worldclient-html-xss(46688)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
          },
          {
            "name": "50011",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/50011"
          },
          {
            "name": "32355",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32355"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-11-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2008-3206",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3206"
        },
        {
          "name": "32142",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32142"
        },
        {
          "name": "worldclient-html-xss(46688)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
        },
        {
          "name": "50011",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/50011"
        },
        {
          "name": "32355",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32355"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-6967",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-3206",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3206"
            },
            {
              "name": "32142",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32142"
            },
            {
              "name": "worldclient-html-xss(46688)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
            },
            {
              "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
              "refsource": "CONFIRM",
              "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
            },
            {
              "name": "50011",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/50011"
            },
            {
              "name": "32355",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32355"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-6967",
    "datePublished": "2009-08-13T16:00:00",
    "dateReserved": "2009-08-13T00:00:00",
    "dateUpdated": "2024-08-07T11:49:02.503Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-1470 (GCVE-0-2003-1470)

Vulnerability from nvd – Published: 2007-10-24 23:00 – Updated: 2024-08-08 02:28
VLAI?
Summary
Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/7446 vdb-entryx_refsource_BID
http://securityreason.com/securityalert/3296 third-party-advisoryx_refsource_SREASON
http://www.securityfocus.com/archive/1/319879 mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:28:03.647Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "7446",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/7446"
          },
          {
            "name": "3296",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3296"
          },
          {
            "name": "20030427 MDaemon SMTP/POP/IMAP server  =\u003ev.6.7.5: IMAP buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/319879"
          },
          {
            "name": "mdaemon-imap-create-bo(11896)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-04-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "7446",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/7446"
        },
        {
          "name": "3296",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3296"
        },
        {
          "name": "20030427 MDaemon SMTP/POP/IMAP server  =\u003ev.6.7.5: IMAP buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/319879"
        },
        {
          "name": "mdaemon-imap-create-bo(11896)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-1470",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "7446",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/7446"
            },
            {
              "name": "3296",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3296"
            },
            {
              "name": "20030427 MDaemon SMTP/POP/IMAP server  =\u003ev.6.7.5: IMAP buffer overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/319879"
            },
            {
              "name": "mdaemon-imap-create-bo(11896)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-1470",
    "datePublished": "2007-10-24T23:00:00",
    "dateReserved": "2007-10-24T00:00:00",
    "dateUpdated": "2024-08-08T02:28:03.647Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-1471 (GCVE-0-2003-1471)

Vulnerability from nvd – Published: 2007-10-24 23:00 – Updated: 2024-08-08 02:28
VLAI?
Summary
MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:28:03.612Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "mdaemon-pop3-negative-dos(11882)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882"
          },
          {
            "name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html"
          },
          {
            "name": "7445",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/7445"
          },
          {
            "name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-04-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "mdaemon-pop3-negative-dos(11882)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882"
        },
        {
          "name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html"
        },
        {
          "name": "7445",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/7445"
        },
        {
          "name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-1471",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "mdaemon-pop3-negative-dos(11882)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882"
            },
            {
              "name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html"
            },
            {
              "name": "7445",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/7445"
            },
            {
              "name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
              "refsource": "BUGTRAQ",
              "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-1471",
    "datePublished": "2007-10-24T23:00:00",
    "dateReserved": "2007-10-24T00:00:00",
    "dateUpdated": "2024-08-08T02:28:03.612Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3622 (GCVE-0-2007-3622)

Vulnerability from nvd – Published: 2007-07-09 16:00 – Updated: 2024-08-07 14:21
VLAI?
Summary
Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://osvdb.org/37193 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/25968 third-party-advisoryx_refsource_SECUNIA
http://www.securitytracker.com/id?1018342 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/24787 vdb-entryx_refsource_BID
http://files.altn.com/MDaemon/Release/RelNotes_en.txt x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:21:36.451Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "37193",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37193"
          },
          {
            "name": "25968",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25968"
          },
          {
            "name": "1018342",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018342"
          },
          {
            "name": "24787",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24787"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
          },
          {
            "name": "mdaemon-domainpop-dos(35285)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "37193",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37193"
        },
        {
          "name": "25968",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25968"
        },
        {
          "name": "1018342",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018342"
        },
        {
          "name": "24787",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24787"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
        },
        {
          "name": "mdaemon-domainpop-dos(35285)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3622",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "37193",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37193"
            },
            {
              "name": "25968",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25968"
            },
            {
              "name": "1018342",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018342"
            },
            {
              "name": "24787",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24787"
            },
            {
              "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
              "refsource": "CONFIRM",
              "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
            },
            {
              "name": "mdaemon-domainpop-dos(35285)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3622",
    "datePublished": "2007-07-09T16:00:00",
    "dateReserved": "2007-07-09T00:00:00",
    "dateUpdated": "2024-08-07T14:21:36.451Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5968 (GCVE-0-2006-5968)

Vulnerability from nvd – Published: 2006-11-17 22:00 – Updated: 2024-08-07 20:12
VLAI?
Summary
MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/secunia_research/2006-67/advisory/ x_refsource_MISC
http://www.vupen.com/english/advisories/2006/4538 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/451821/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/21554 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://securityreason.com/securityalert/1890 third-party-advisoryx_refsource_SREASON
http://securitytracker.com/id?1017238 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:12:31.178Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-67/advisory/"
          },
          {
            "name": "ADV-2006-4538",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4538"
          },
          {
            "name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
          },
          {
            "name": "21554",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21554"
          },
          {
            "name": "mdaemon-folder-privilege-escalation(30331)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
          },
          {
            "name": "1890",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1890"
          },
          {
            "name": "1017238",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017238"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\\APP folder, which is an untrusted search path element due to insecure permissions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
        "shortName": "flexera"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-67/advisory/"
        },
        {
          "name": "ADV-2006-4538",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4538"
        },
        {
          "name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
        },
        {
          "name": "21554",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21554"
        },
        {
          "name": "mdaemon-folder-privilege-escalation(30331)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
        },
        {
          "name": "1890",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1890"
        },
        {
          "name": "1017238",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017238"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
          "ID": "CVE-2006-5968",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\\APP folder, which is an untrusted search path element due to insecure permissions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://secunia.com/secunia_research/2006-67/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-67/advisory/"
            },
            {
              "name": "ADV-2006-4538",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4538"
            },
            {
              "name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
            },
            {
              "name": "21554",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21554"
            },
            {
              "name": "mdaemon-folder-privilege-escalation(30331)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
            },
            {
              "name": "1890",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1890"
            },
            {
              "name": "1017238",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017238"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
    "assignerShortName": "flexera",
    "cveId": "CVE-2006-5968",
    "datePublished": "2006-11-17T22:00:00",
    "dateReserved": "2006-11-17T00:00:00",
    "dateUpdated": "2024-08-07T20:12:31.178Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5709 (GCVE-0-2006-5709)

Vulnerability from nvd – Published: 2006-11-04 01:00 – Updated: 2024-08-07 20:04
VLAI?
Summary
Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a "JavaScript exploit."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:04:54.289Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "22507",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22507"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
          },
          {
            "name": "ADV-2006-4251",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4251"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a \"JavaScript exploit.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "22507",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22507"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
        },
        {
          "name": "ADV-2006-4251",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4251"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5709",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a \"JavaScript exploit.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "22507",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22507"
            },
            {
              "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
              "refsource": "CONFIRM",
              "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
            },
            {
              "name": "ADV-2006-4251",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4251"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5709",
    "datePublished": "2006-11-04T01:00:00",
    "dateReserved": "2006-11-03T00:00:00",
    "dateUpdated": "2024-08-07T20:04:54.289Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5708 (GCVE-0-2006-5708)

Vulnerability from nvd – Published: 2006-11-04 01:00 – Updated: 2025-04-03 15:26
VLAI?
Summary
Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:04:54.460Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2006-5708",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-03T15:25:25.541724Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-400",
                "description": "CWE-400 Uncontrolled Resource Consumption",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-03T15:26:14.870Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-11-04T01:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
              "refsource": "CONFIRM",
              "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5708",
    "datePublished": "2006-11-04T01:00:00.000Z",
    "dateReserved": "2006-11-03T00:00:00.000Z",
    "dateUpdated": "2025-04-03T15:26:14.870Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4364 (GCVE-0-2006-4364)

Vulnerability from nvd – Published: 2006-08-25 23:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.exploit-db.com/exploits/2245 exploitx_refsource_EXPLOIT-DB
http://securitytracker.com/id?1016729 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/3361 vdb-entryx_refsource_VUPEN
http://www.infigo.hr/en/in_focus/advisories/INFIG… x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/archive/1/444015/100… mailing-listx_refsource_BUGTRAQ
http://securityreason.com/securityalert/1446 third-party-advisoryx_refsource_SREASON
http://www.securityfocus.com/bid/19651 vdb-entryx_refsource_BID
http://files.altn.com/MDaemon/Release/RelNotes_en.txt x_refsource_CONFIRM
http://secunia.com/advisories/21595 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/28125 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:06:07.630Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2245",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/2245"
          },
          {
            "name": "1016729",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016729"
          },
          {
            "name": "ADV-2006-3361",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3361"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
          },
          {
            "name": "mdaemon-pop3-bo(28517)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
          },
          {
            "name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
          },
          {
            "name": "1446",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1446"
          },
          {
            "name": "19651",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19651"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
          },
          {
            "name": "21595",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21595"
          },
          {
            "name": "28125",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/28125"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain \u0027@\u0027 characters in the (1) USER and (2) APOP commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "2245",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/2245"
        },
        {
          "name": "1016729",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016729"
        },
        {
          "name": "ADV-2006-3361",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3361"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
        },
        {
          "name": "mdaemon-pop3-bo(28517)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
        },
        {
          "name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
        },
        {
          "name": "1446",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1446"
        },
        {
          "name": "19651",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19651"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
        },
        {
          "name": "21595",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21595"
        },
        {
          "name": "28125",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/28125"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4364",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain \u0027@\u0027 characters in the (1) USER and (2) APOP commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2245",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/2245"
            },
            {
              "name": "1016729",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016729"
            },
            {
              "name": "ADV-2006-3361",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3361"
            },
            {
              "name": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04",
              "refsource": "MISC",
              "url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
            },
            {
              "name": "mdaemon-pop3-bo(28517)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
            },
            {
              "name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
            },
            {
              "name": "1446",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1446"
            },
            {
              "name": "19651",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19651"
            },
            {
              "name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
              "refsource": "CONFIRM",
              "url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
            },
            {
              "name": "21595",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21595"
            },
            {
              "name": "28125",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/28125"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4364",
    "datePublished": "2006-08-25T23:00:00",
    "dateReserved": "2006-08-25T00:00:00",
    "dateUpdated": "2024-08-07T19:06:07.630Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-2646 (GCVE-0-2006-2646)

Vulnerability from nvd – Published: 2006-05-30 10:00 – Updated: 2024-08-07 17:58
VLAI?
Summary
Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a '"' (double quote).
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/18129 vdb-entryx_refsource_BID
http://securitytracker.com/id?1016167 vdb-entryx_refsource_SECTRACK
http://marc.info/?l=full-disclosure&m=11488227091… mailing-listx_refsource_FULLDISC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:58:51.774Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18129",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18129"
          },
          {
            "name": "1016167",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016167"
          },
          {
            "name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a \u0027\"\u0027 (double quote)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18129",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18129"
        },
        {
          "name": "1016167",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016167"
        },
        {
          "name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2646",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a \u0027\"\u0027 (double quote)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18129",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18129"
            },
            {
              "name": "1016167",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016167"
            },
            {
              "name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2646",
    "datePublished": "2006-05-30T10:00:00",
    "dateReserved": "2006-05-30T00:00:00",
    "dateUpdated": "2024-08-07T17:58:51.774Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0925 (GCVE-0-2006-0925)

Vulnerability from nvd – Published: 2006-02-28 11:00 – Updated: 2024-08-07 16:56
VLAI?
Summary
Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/18921 third-party-advisoryx_refsource_SECUNIA
http://www.nsag.ru/vuln/888.html x_refsource_MISC
http://www.vupen.com/english/advisories/2006/0729 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/16854 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:56:13.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "mdaemon-imap-foldername-dos(24916)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
          },
          {
            "name": "18921",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18921"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nsag.ru/vuln/888.html"
          },
          {
            "name": "ADV-2006-0729",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0729"
          },
          {
            "name": "16854",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16854"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-02-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "mdaemon-imap-foldername-dos(24916)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
        },
        {
          "name": "18921",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18921"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nsag.ru/vuln/888.html"
        },
        {
          "name": "ADV-2006-0729",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0729"
        },
        {
          "name": "16854",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16854"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0925",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "mdaemon-imap-foldername-dos(24916)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
            },
            {
              "name": "18921",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18921"
            },
            {
              "name": "http://www.nsag.ru/vuln/888.html",
              "refsource": "MISC",
              "url": "http://www.nsag.ru/vuln/888.html"
            },
            {
              "name": "ADV-2006-0729",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0729"
            },
            {
              "name": "16854",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16854"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0925",
    "datePublished": "2006-02-28T11:00:00",
    "dateReserved": "2006-02-28T00:00:00",
    "dateUpdated": "2024-08-07T16:56:13.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}