Search criteria
86 vulnerabilities found for mdaemon by alt-n
FKIE_CVE-2008-6967
Vulnerability from fkie_nvd - Published: 2009-08-13 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E29B9A0-41DA-48C6-9CCE-746256C18D02",
"versionEndIncluding": "10.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "7503CBFE-B6F8-457E-BA78-16414EE14789",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*",
"matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*",
"matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB9AF729-E2FA-4703-86AB-AD7416BD6EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "72594AA0-3CB8-4F87-B709-F81E18D2ECBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50D5F6E0-2047-4531-8C01-D79D3AE69170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9CEAB790-561D-4815-99E0-78B62294B54E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20CB70E2-1E3A-4FC1-BD26-E22EAC68D874",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8AC4F7-CADE-448D-82C6-C4D19EAAADFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A4A93052-5501-431A-B6E5-7C0574C66C63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D5CE884A-B10D-4E2F-B020-92C2CB2CAE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.50:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4AD8B6-940B-445F-83EE-77379CFF36DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.51:*:*:*:*:*:*:*",
"matchCriteriaId": "1A3610BC-6E11-437F-B7DF-3FEC2812BBC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.53:*:*:*:*:*:*:*",
"matchCriteriaId": "B578384C-73DA-4D2A-8A5D-5293391A3172",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.60:*:*:*:*:*:*:*",
"matchCriteriaId": "964F316B-E449-49BA-8FF6-343D20AA7716",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.64:*:*:*:*:*:*:*",
"matchCriteriaId": "315E7C89-460E-4A0F-89B9-9228DCC1EF00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:worldclient:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF20F74D-1767-411D-9474-F2597293E1F1",
"versionEndIncluding": "10.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:worldclient:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D4C366-2A06-4D1E-AC25-368CFA4D2305",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:worldclient:2.1:*:standard:*:*:*:*:*",
"matchCriteriaId": "27A288FA-8810-4615-B2AD-E595FEDA3A66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:worldclient:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97FD2E84-B802-4BDA-A39B-D84F67ABC21C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:worldclient:5.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "B12B5202-F814-4962-A09E-44B9C075FF1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:worldclient:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9343C918-6C63-4EE7-9B30-30C1209041C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:worldclient:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "13AE088E-E03F-4BB0-8A5B-ED2734B3B0D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:worldclient:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2DFD683F-21E3-49CA-B22A-40FA79FECF57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:worldclient:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC30F32-5C76-4D1A-979D-949D0C1DC39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:worldclient:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F4FAD806-A5CE-46D5-AD59-13F364F988EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:worldclient:8.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BB67A240-BF23-4B74-944D-127B263154E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidad no especificada en WorldClient en Alt-N MDaemon anteriores a v10.02 tienen impacto desconocido y vector de ataque, probablemente relativo a de ejecuci\u00f3n de secuencias de comandos en sitios cruzados - XSS - WorldClient DLL v10.0.1, una vulnerabilidad diferente que CVE-2008-6893."
}
],
"id": "CVE-2008-6967",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-08-13T16:30:01.077",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/50011"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32142"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/32355"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/3206"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/50011"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32142"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/32355"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/3206"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-3622
Vulnerability from fkie_nvd - Published: 2007-07-09 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8495C07-40E4-45D2-B7CE-F5BEBC6CEBA7",
"versionEndIncluding": "9.60",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en DomainPOP en Alt-N Technologies MDaemon anterior a 9.61 permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida) a trav\u00e9s de mensajes malformados."
}
],
"id": "CVE-2007-3622",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-07-09T16:30:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/37193"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25968"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/24787"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1018342"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/37193"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25968"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/24787"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1018342"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-5968
Vulnerability from fkie_nvd - Published: 2006-11-17 22:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20CB70E2-1E3A-4FC1-BD26-E22EAC68D874",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DC8AC4F7-CADE-448D-82C6-C4D19EAAADFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.51:*:*:*:*:*:*:*",
"matchCriteriaId": "1A3610BC-6E11-437F-B7DF-3FEC2812BBC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.53:*:*:*:*:*:*:*",
"matchCriteriaId": "B578384C-73DA-4D2A-8A5D-5293391A3172",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\\APP folder, which is an untrusted search path element due to insecure permissions."
},
{
"lang": "es",
"value": "MDaemon 9.0.5, 9.0.6, 9.51, y 9.53, y posiblemente otras versiones, instalan la carpeta de la aplicaci\u00f3n MDaemon con permisos no seguros (los usuarios crean ficheros/directorios), lo cual permite a un usuario local ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de la creacion de c\u00f3digo malicioso de las librerias RASAPI32.DLL o MPRAPI.DLL en la carpeta MDaemon\\APP, lo cual no es una carpeta de b\u00fasqueda correcta debido a lo permisos poco seguros."
}
],
"id": "CVE-2006-5968",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-11-17T22:07:00.000",
"references": [
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://secunia.com/advisories/21554"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/secunia_research/2006-67/advisory/"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://securityreason.com/securityalert/1890"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://securitytracker.com/id?1017238"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "http://www.vupen.com/english/advisories/2006/4538"
},
{
"source": "PSIRT-CNA@flexerasoftware.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21554"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/secunia_research/2006-67/advisory/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/1890"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1017238"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/4538"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
}
],
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-5709
Vulnerability from fkie_nvd - Published: 2006-11-04 01:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a "JavaScript exploit."
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E380CE-3453-46AF-BDEE-3AB04997E5A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a \"JavaScript exploit.\""
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en WorldClient de Alt-N Technologies MDaemon versiones anteriores a 9.50 tiene un impacto desconocido y vectores de ataque referidos a \"JavaScript exploit.\""
}
],
"id": "CVE-2006-5709",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-11-04T01:07:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/22507"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/4251"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/22507"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/4251"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-5708
Vulnerability from fkie_nvd - Published: 2006-11-04 01:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| alt-n | mdaemon | * | |
| alt-n | mdaemon | 2.8 | |
| alt-n | mdaemon | 2.8.5.0 | |
| alt-n | mdaemon | 2.71_sp1 | |
| alt-n | mdaemon | 3.0.3 | |
| alt-n | mdaemon | 3.0.4 | |
| alt-n | mdaemon | 3.1.1 | |
| alt-n | mdaemon | 3.1.2 | |
| alt-n | mdaemon | 3.1_beta | |
| alt-n | mdaemon | 3.5.0 | |
| alt-n | mdaemon | 3.5.1 | |
| alt-n | mdaemon | 3.5.4 | |
| alt-n | mdaemon | 3.5.4 | |
| alt-n | mdaemon | 3.5.4 | |
| alt-n | mdaemon | 3.5.6 | |
| alt-n | mdaemon | 5.0 | |
| alt-n | mdaemon | 5.0 | |
| alt-n | mdaemon | 5.0.1 | |
| alt-n | mdaemon | 5.0.2 | |
| alt-n | mdaemon | 5.0.3 | |
| alt-n | mdaemon | 5.0.4 | |
| alt-n | mdaemon | 5.0.5 | |
| alt-n | mdaemon | 5.0.6 | |
| alt-n | mdaemon | 5.0.7 | |
| alt-n | mdaemon | 6.0 | |
| alt-n | mdaemon | 6.0.5 | |
| alt-n | mdaemon | 6.0.6 | |
| alt-n | mdaemon | 6.0.7 | |
| alt-n | mdaemon | 6.5.0 | |
| alt-n | mdaemon | 6.5.1 | |
| alt-n | mdaemon | 6.5.2 | |
| alt-n | mdaemon | 6.7.5 | |
| alt-n | mdaemon | 6.7.9 | |
| alt-n | mdaemon | 6.8.0 | |
| alt-n | mdaemon | 6.8.1 | |
| alt-n | mdaemon | 6.8.2 | |
| alt-n | mdaemon | 6.8.3 | |
| alt-n | mdaemon | 6.8.4 | |
| alt-n | mdaemon | 6.8.5 | |
| alt-n | mdaemon | 7.2 | |
| alt-n | mdaemon | 8.1.1 | |
| alt-n | mdaemon | 8.1.3 | |
| alt-n | mdaemon | 8.1.4 | |
| alt-n | mdaemon | 9.0.1 | |
| alt-n | mdaemon | 9.0.2 | |
| alt-n | mdaemon | 9.0.3 | |
| alt-n | mdaemon | 9.0.4 | |
| alt-n | mdaemon | 9.0.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "050AC344-C537-473A-B1C7-286C4DFCC34A",
"versionEndIncluding": "9.50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "7503CBFE-B6F8-457E-BA78-16414EE14789",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*",
"matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*",
"matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DAC727D-046D-4021-BAE8-6CAD7890FEDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "01B10DB1-1E18-4B58-B1E4-6A09871100CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "63A828E9-31AF-4199-9642-583830A1F180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F58E3A-8C0C-43C4-BAF3-05DD4DDC81C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "437D2888-340C-48AB-815E-C04E5DE44CAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "46604A07-FBB0-4111-8B1C-2D01086BBB71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD17AD0-27FE-49F5-A23D-2DE672D87C17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB9AF729-E2FA-4703-86AB-AD7416BD6EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "72594AA0-3CB8-4F87-B709-F81E18D2ECBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50D5F6E0-2047-4531-8C01-D79D3AE69170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9CEAB790-561D-4815-99E0-78B62294B54E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20CB70E2-1E3A-4FC1-BD26-E22EAC68D874",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabildiades no especificas en MDaemon y WorldClient en Alt-N Technologies MDaemon anteriores a 9.50 permite a un atacante remoto provocar denegaci\u00f3n de servicio (cosumo de memoria) a trav\u00e9s de vectores no especificados resultado de filtros de memoria."
}
],
"evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nAlt-N Technologies, MDaemon, 9.50",
"id": "CVE-2006-5708",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2006-11-04T01:07:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2006-4364
Vulnerability from fkie_nvd - Published: 2006-08-27 02:04 - Updated: 2025-04-03 01:03
Severity ?
Summary
Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| alt-n | mdaemon | 2.8 | |
| alt-n | mdaemon | 2.8.5.0 | |
| alt-n | mdaemon | 2.71_sp1 | |
| alt-n | mdaemon | 3.0.3 | |
| alt-n | mdaemon | 3.0.4 | |
| alt-n | mdaemon | 3.1.1 | |
| alt-n | mdaemon | 3.1.2 | |
| alt-n | mdaemon | 3.1_beta | |
| alt-n | mdaemon | 3.5.0 | |
| alt-n | mdaemon | 3.5.1 | |
| alt-n | mdaemon | 3.5.4 | |
| alt-n | mdaemon | 3.5.4 | |
| alt-n | mdaemon | 3.5.4 | |
| alt-n | mdaemon | 3.5.6 | |
| alt-n | mdaemon | 5.0 | |
| alt-n | mdaemon | 5.0 | |
| alt-n | mdaemon | 5.0.1 | |
| alt-n | mdaemon | 5.0.2 | |
| alt-n | mdaemon | 5.0.3 | |
| alt-n | mdaemon | 5.0.4 | |
| alt-n | mdaemon | 5.0.5 | |
| alt-n | mdaemon | 5.0.6 | |
| alt-n | mdaemon | 5.0.7 | |
| alt-n | mdaemon | 6.0 | |
| alt-n | mdaemon | 6.0.5 | |
| alt-n | mdaemon | 6.0.6 | |
| alt-n | mdaemon | 6.0.7 | |
| alt-n | mdaemon | 6.5.0 | |
| alt-n | mdaemon | 6.5.1 | |
| alt-n | mdaemon | 6.5.2 | |
| alt-n | mdaemon | 6.7.5 | |
| alt-n | mdaemon | 6.7.9 | |
| alt-n | mdaemon | 6.8.0 | |
| alt-n | mdaemon | 6.8.1 | |
| alt-n | mdaemon | 6.8.2 | |
| alt-n | mdaemon | 6.8.3 | |
| alt-n | mdaemon | 6.8.4 | |
| alt-n | mdaemon | 6.8.5 | |
| alt-n | mdaemon | 7.2 | |
| alt-n | mdaemon | 8.1.1 | |
| alt-n | mdaemon | 8.1.3 | |
| alt-n | mdaemon | 8.1.4 | |
| alt-n | mdaemon | 9.0.1 | |
| alt-n | mdaemon | 9.0.2 | |
| alt-n | mdaemon | 9.0.3 | |
| alt-n | mdaemon | 9.0.4 | |
| alt-n | mdaemon | 9.0.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "7503CBFE-B6F8-457E-BA78-16414EE14789",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*",
"matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*",
"matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DAC727D-046D-4021-BAE8-6CAD7890FEDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "01B10DB1-1E18-4B58-B1E4-6A09871100CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "63A828E9-31AF-4199-9642-583830A1F180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F58E3A-8C0C-43C4-BAF3-05DD4DDC81C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "437D2888-340C-48AB-815E-C04E5DE44CAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "46604A07-FBB0-4111-8B1C-2D01086BBB71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD17AD0-27FE-49F5-A23D-2DE672D87C17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB9AF729-E2FA-4703-86AB-AD7416BD6EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "72594AA0-3CB8-4F87-B709-F81E18D2ECBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50D5F6E0-2047-4531-8C01-D79D3AE69170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9CEAB790-561D-4815-99E0-78B62294B54E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20CB70E2-1E3A-4FC1-BD26-E22EAC68D874",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain \u0027@\u0027 characters in the (1) USER and (2) APOP commands."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer en el servidor POP3 de Alt-N Technologies MDaemon anterior a 9.0.6 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante cadenas largas que contienen caracteres \u0027@\u0027 en los comandos (1) USER y (2) APOP."
}
],
"id": "CVE-2006-4364",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-08-27T02:04:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21595"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/1446"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1016729"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/28125"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/19651"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/3361"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/2245"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21595"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/1446"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1016729"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/28125"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/19651"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/3361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/2245"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-2646
Vulnerability from fkie_nvd - Published: 2006-05-30 10:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a '"' (double quote).
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| alt-n | mdaemon | 2.8 | |
| alt-n | mdaemon | 2.8.5.0 | |
| alt-n | mdaemon | 3.0.3 | |
| alt-n | mdaemon | 3.0.4 | |
| alt-n | mdaemon | 3.1.1 | |
| alt-n | mdaemon | 3.1.2 | |
| alt-n | mdaemon | 3.1_beta | |
| alt-n | mdaemon | 3.5.0 | |
| alt-n | mdaemon | 3.5.1 | |
| alt-n | mdaemon | 3.5.4 | |
| alt-n | mdaemon | 3.5.4 | |
| alt-n | mdaemon | 3.5.4 | |
| alt-n | mdaemon | 3.5.6 | |
| alt-n | mdaemon | 5.0 | |
| alt-n | mdaemon | 5.0 | |
| alt-n | mdaemon | 5.0.1 | |
| alt-n | mdaemon | 5.0.2 | |
| alt-n | mdaemon | 5.0.3 | |
| alt-n | mdaemon | 5.0.4 | |
| alt-n | mdaemon | 5.0.5 | |
| alt-n | mdaemon | 5.0.6 | |
| alt-n | mdaemon | 5.0.7 | |
| alt-n | mdaemon | 6.0 | |
| alt-n | mdaemon | 6.0.5 | |
| alt-n | mdaemon | 6.0.6 | |
| alt-n | mdaemon | 6.0.7 | |
| alt-n | mdaemon | 6.5.0 | |
| alt-n | mdaemon | 6.5.1 | |
| alt-n | mdaemon | 6.5.2 | |
| alt-n | mdaemon | 6.7.5 | |
| alt-n | mdaemon | 6.7.9 | |
| alt-n | mdaemon | 6.8.0 | |
| alt-n | mdaemon | 6.8.1 | |
| alt-n | mdaemon | 6.8.2 | |
| alt-n | mdaemon | 6.8.3 | |
| alt-n | mdaemon | 6.8.4 | |
| alt-n | mdaemon | 6.8.5 | |
| alt-n | mdaemon | 7.2 | |
| alt-n | mdaemon | 8.1.1 | |
| alt-n | mdaemon | 8.1.3 | |
| alt-n | mdaemon | 8.1.4 | |
| alt-n | mdaemon | 9.0.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "63BE92A3-5320-4E68-89F7-BF977E602FB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6727183-BD1B-4816-A0B0-3CA24B1F41D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "74E791DD-1376-4E77-9D7B-C66E88146248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "759C3190-DABF-4C54-8D26-A5285883BFA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AF752E6A-0AB8-4B82-A895-9AF79B0783FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CFA585E-4355-4497-8936-FD63E334B917",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "6906B4D1-9336-4E52-A1D4-1402F5EF2BBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96A1816E-0E48-4879-86A4-22E7FCCAC598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B02DB57-1B98-43AF-B400-73019A747C5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0E724258-DCD1-4F09-AD2F-3880F86FA649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*",
"matchCriteriaId": "0906EDEB-A59F-4DDD-8763-AFA9EC78F9BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*",
"matchCriteriaId": "2CFEEA75-350C-47D6-A2D4-8714D1D4907A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "772A222C-606C-42B5-A523-9584FFB9E0BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1A537AF6-0E86-41BD-AA41-B1598DCA01D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A5162F06-31BD-4B04-8F60-A4ACBB7E16DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8CCADFC8-99A1-4F7E-96E6-FD6F3F35EA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AECE0B12-1F51-49A9-9C66-B7DC94ACE0F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E9125B2D-3EED-4014-8622-E9EBC5B2C99A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA9FB24-DF9E-4A58-9F4B-B1613ADFCC77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DAC727D-046D-4021-BAE8-6CAD7890FEDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "01B10DB1-1E18-4B58-B1E4-6A09871100CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "63A828E9-31AF-4199-9642-583830A1F180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F58E3A-8C0C-43C4-BAF3-05DD4DDC81C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "437D2888-340C-48AB-815E-C04E5DE44CAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "46604A07-FBB0-4111-8B1C-2D01086BBB71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD17AD0-27FE-49F5-A23D-2DE672D87C17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4141E02E-C2DA-42C0-ABAB-62AFE4F869AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32AA5447-4879-41A7-8F92-CAB0C3CD5E6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2A9121D0-504E-444B-94C3-0E5C240376C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BA25D7ED-BA8E-45E0-9399-B85499EF74D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB9AF729-E2FA-4703-86AB-AD7416BD6EBE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a \u0027\"\u0027 (double quote)."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en Alt-N MDaemon, posiblemente 9.0.1 y versiones anteriores, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un argumento A0001 largo que comienza con un \u0027\"\u0027 (comillas dobles)."
}
],
"id": "CVE-2006-2646",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-05-30T10:02:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://securitytracker.com/id?1016167"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/18129"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://securitytracker.com/id?1016167"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/18129"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-0925
Vulnerability from fkie_nvd - Published: 2006-02-28 11:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB0B5F8-F010-4B70-947B-EA28EA38E237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EFC20A7-14DF-4E00-873B-6F97A10EEA19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers."
}
],
"id": "CVE-2006-0925",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-02-28T11:02:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/18921"
},
{
"source": "cve@mitre.org",
"url": "http://www.nsag.ru/vuln/888.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/16854"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/0729"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/18921"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.nsag.ru/vuln/888.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/16854"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/0729"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-4266
Vulnerability from fkie_nvd - Published: 2005-12-15 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| alt-n | mdaemon | 8.1.3 | |
| alt-n | worldclient | 8.1.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8F04FD52-7EA8-430E-86C7-5D3733A449AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alt-n:worldclient:8.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BB67A240-BF23-4B74-944D-127B263154E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value."
}
],
"id": "CVE-2005-4266",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-12-15T11:03:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/17990"
},
{
"source": "cve@mitre.org",
"url": "http://www.ipomonis.com/advisories/mdaemon.zip"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/17990"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ipomonis.com/advisories/mdaemon.zip"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2008-6967 (GCVE-0-2008-6967)
Vulnerability from cvelistv5 – Published: 2009-08-13 16:00 – Updated: 2024-08-07 11:49
VLAI?
Summary
Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:49:02.503Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-3206",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/3206"
},
{
"name": "32142",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32142"
},
{
"name": "worldclient-html-xss(46688)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "50011",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/50011"
},
{
"name": "32355",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/32355"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-11-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2008-3206",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/3206"
},
{
"name": "32142",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32142"
},
{
"name": "worldclient-html-xss(46688)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "50011",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/50011"
},
{
"name": "32355",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/32355"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-6967",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-3206",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3206"
},
{
"name": "32142",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32142"
},
{
"name": "worldclient-html-xss(46688)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
},
{
"name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
"refsource": "CONFIRM",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "50011",
"refsource": "OSVDB",
"url": "http://osvdb.org/50011"
},
{
"name": "32355",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32355"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-6967",
"datePublished": "2009-08-13T16:00:00",
"dateReserved": "2009-08-13T00:00:00",
"dateUpdated": "2024-08-07T11:49:02.503Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2003-1470 (GCVE-0-2003-1470)
Vulnerability from cvelistv5 – Published: 2007-10-24 23:00 – Updated: 2024-08-08 02:28
VLAI?
Summary
Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:28:03.647Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "7446",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/7446"
},
{
"name": "3296",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3296"
},
{
"name": "20030427 MDaemon SMTP/POP/IMAP server =\u003ev.6.7.5: IMAP buffer overflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/319879"
},
{
"name": "mdaemon-imap-create-bo(11896)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2003-04-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "7446",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/7446"
},
{
"name": "3296",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3296"
},
{
"name": "20030427 MDaemon SMTP/POP/IMAP server =\u003ev.6.7.5: IMAP buffer overflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/319879"
},
{
"name": "mdaemon-imap-create-bo(11896)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1470",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "7446",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/7446"
},
{
"name": "3296",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3296"
},
{
"name": "20030427 MDaemon SMTP/POP/IMAP server =\u003ev.6.7.5: IMAP buffer overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/319879"
},
{
"name": "mdaemon-imap-create-bo(11896)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2003-1470",
"datePublished": "2007-10-24T23:00:00",
"dateReserved": "2007-10-24T00:00:00",
"dateUpdated": "2024-08-08T02:28:03.647Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2003-1471 (GCVE-0-2003-1471)
Vulnerability from cvelistv5 – Published: 2007-10-24 23:00 – Updated: 2024-08-08 02:28
VLAI?
Summary
MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:28:03.612Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "mdaemon-pop3-negative-dos(11882)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882"
},
{
"name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html"
},
{
"name": "7445",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/7445"
},
{
"name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2003-04-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "mdaemon-pop3-negative-dos(11882)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882"
},
{
"name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html"
},
{
"name": "7445",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/7445"
},
{
"name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1471",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "mdaemon-pop3-negative-dos(11882)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882"
},
{
"name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html"
},
{
"name": "7445",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/7445"
},
{
"name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
"refsource": "BUGTRAQ",
"url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2003-1471",
"datePublished": "2007-10-24T23:00:00",
"dateReserved": "2007-10-24T00:00:00",
"dateUpdated": "2024-08-08T02:28:03.612Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-3622 (GCVE-0-2007-3622)
Vulnerability from cvelistv5 – Published: 2007-07-09 16:00 – Updated: 2024-08-07 14:21
VLAI?
Summary
Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T14:21:36.451Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "37193",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37193"
},
{
"name": "25968",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25968"
},
{
"name": "1018342",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018342"
},
{
"name": "24787",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/24787"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "mdaemon-domainpop-dos(35285)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-07-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "37193",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37193"
},
{
"name": "25968",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25968"
},
{
"name": "1018342",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018342"
},
{
"name": "24787",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/24787"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "mdaemon-domainpop-dos(35285)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-3622",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "37193",
"refsource": "OSVDB",
"url": "http://osvdb.org/37193"
},
{
"name": "25968",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25968"
},
{
"name": "1018342",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018342"
},
{
"name": "24787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24787"
},
{
"name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
"refsource": "CONFIRM",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "mdaemon-domainpop-dos(35285)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-3622",
"datePublished": "2007-07-09T16:00:00",
"dateReserved": "2007-07-09T00:00:00",
"dateUpdated": "2024-08-07T14:21:36.451Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5968 (GCVE-0-2006-5968)
Vulnerability from cvelistv5 – Published: 2006-11-17 22:00 – Updated: 2024-08-07 20:12
VLAI?
Summary
MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:12:31.178Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://secunia.com/secunia_research/2006-67/advisory/"
},
{
"name": "ADV-2006-4538",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/4538"
},
{
"name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
},
{
"name": "21554",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21554"
},
{
"name": "mdaemon-folder-privilege-escalation(30331)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
},
{
"name": "1890",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/1890"
},
{
"name": "1017238",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017238"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-11-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\\APP folder, which is an untrusted search path element due to insecure permissions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"shortName": "flexera"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://secunia.com/secunia_research/2006-67/advisory/"
},
{
"name": "ADV-2006-4538",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/4538"
},
{
"name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
},
{
"name": "21554",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21554"
},
{
"name": "mdaemon-folder-privilege-escalation(30331)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
},
{
"name": "1890",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/1890"
},
{
"name": "1017238",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017238"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-5968",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\\APP folder, which is an untrusted search path element due to insecure permissions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://secunia.com/secunia_research/2006-67/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-67/advisory/"
},
{
"name": "ADV-2006-4538",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4538"
},
{
"name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
},
{
"name": "21554",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21554"
},
{
"name": "mdaemon-folder-privilege-escalation(30331)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
},
{
"name": "1890",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1890"
},
{
"name": "1017238",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017238"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"assignerShortName": "flexera",
"cveId": "CVE-2006-5968",
"datePublished": "2006-11-17T22:00:00",
"dateReserved": "2006-11-17T00:00:00",
"dateUpdated": "2024-08-07T20:12:31.178Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5709 (GCVE-0-2006-5709)
Vulnerability from cvelistv5 – Published: 2006-11-04 01:00 – Updated: 2024-08-07 20:04
VLAI?
Summary
Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a "JavaScript exploit."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:04:54.289Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "22507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22507"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "ADV-2006-4251",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/4251"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-10-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a \"JavaScript exploit.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-02-26T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "22507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22507"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "ADV-2006-4251",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/4251"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5709",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a \"JavaScript exploit.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "22507",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22507"
},
{
"name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
"refsource": "CONFIRM",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "ADV-2006-4251",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4251"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5709",
"datePublished": "2006-11-04T01:00:00",
"dateReserved": "2006-11-03T00:00:00",
"dateUpdated": "2024-08-07T20:04:54.289Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5708 (GCVE-0-2006-5708)
Vulnerability from cvelistv5 – Published: 2006-11-04 01:00 – Updated: 2025-04-03 15:26
VLAI?
Summary
Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks.
Severity ?
7.5 (High)
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:04:54.460Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2006-5708",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-03T15:25:25.541724Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-03T15:26:14.870Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2006-11-04T01:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5708",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
"refsource": "CONFIRM",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5708",
"datePublished": "2006-11-04T01:00:00.000Z",
"dateReserved": "2006-11-03T00:00:00.000Z",
"dateUpdated": "2025-04-03T15:26:14.870Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-4364 (GCVE-0-2006-4364)
Vulnerability from cvelistv5 – Published: 2006-08-25 23:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:06:07.630Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "2245",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/2245"
},
{
"name": "1016729",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016729"
},
{
"name": "ADV-2006-3361",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3361"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
},
{
"name": "mdaemon-pop3-bo(28517)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
},
{
"name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
},
{
"name": "1446",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/1446"
},
{
"name": "19651",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19651"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "21595",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21595"
},
{
"name": "28125",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/28125"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-08-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain \u0027@\u0027 characters in the (1) USER and (2) APOP commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "2245",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/2245"
},
{
"name": "1016729",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016729"
},
{
"name": "ADV-2006-3361",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3361"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
},
{
"name": "mdaemon-pop3-bo(28517)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
},
{
"name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
},
{
"name": "1446",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/1446"
},
{
"name": "19651",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19651"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "21595",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21595"
},
{
"name": "28125",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/28125"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4364",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain \u0027@\u0027 characters in the (1) USER and (2) APOP commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "2245",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2245"
},
{
"name": "1016729",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016729"
},
{
"name": "ADV-2006-3361",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3361"
},
{
"name": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04",
"refsource": "MISC",
"url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
},
{
"name": "mdaemon-pop3-bo(28517)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
},
{
"name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
},
{
"name": "1446",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1446"
},
{
"name": "19651",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19651"
},
{
"name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
"refsource": "CONFIRM",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "21595",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21595"
},
{
"name": "28125",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28125"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4364",
"datePublished": "2006-08-25T23:00:00",
"dateReserved": "2006-08-25T00:00:00",
"dateUpdated": "2024-08-07T19:06:07.630Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-2646 (GCVE-0-2006-2646)
Vulnerability from cvelistv5 – Published: 2006-05-30 10:00 – Updated: 2024-08-07 17:58
VLAI?
Summary
Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a '"' (double quote).
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T17:58:51.774Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "18129",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/18129"
},
{
"name": "1016167",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016167"
},
{
"name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-05-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a \u0027\"\u0027 (double quote)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-10-17T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "18129",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/18129"
},
{
"name": "1016167",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016167"
},
{
"name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-2646",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a \u0027\"\u0027 (double quote)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "18129",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18129"
},
{
"name": "1016167",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016167"
},
{
"name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-2646",
"datePublished": "2006-05-30T10:00:00",
"dateReserved": "2006-05-30T00:00:00",
"dateUpdated": "2024-08-07T17:58:51.774Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-0925 (GCVE-0-2006-0925)
Vulnerability from cvelistv5 – Published: 2006-02-28 11:00 – Updated: 2024-08-07 16:56
VLAI?
Summary
Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T16:56:13.945Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "mdaemon-imap-foldername-dos(24916)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
},
{
"name": "18921",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18921"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.nsag.ru/vuln/888.html"
},
{
"name": "ADV-2006-0729",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0729"
},
{
"name": "16854",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16854"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-02-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "mdaemon-imap-foldername-dos(24916)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
},
{
"name": "18921",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18921"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.nsag.ru/vuln/888.html"
},
{
"name": "ADV-2006-0729",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0729"
},
{
"name": "16854",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16854"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0925",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "mdaemon-imap-foldername-dos(24916)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
},
{
"name": "18921",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18921"
},
{
"name": "http://www.nsag.ru/vuln/888.html",
"refsource": "MISC",
"url": "http://www.nsag.ru/vuln/888.html"
},
{
"name": "ADV-2006-0729",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0729"
},
{
"name": "16854",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16854"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-0925",
"datePublished": "2006-02-28T11:00:00",
"dateReserved": "2006-02-28T00:00:00",
"dateUpdated": "2024-08-07T16:56:13.945Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-4266 (GCVE-0-2005-4266)
Vulnerability from cvelistv5 – Published: 2005-12-15 11:00 – Updated: 2024-09-16 18:03
VLAI?
Summary
WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T23:38:51.629Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.ipomonis.com/advisories/mdaemon.zip"
},
{
"name": "17990",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17990"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-12-15T11:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.ipomonis.com/advisories/mdaemon.zip"
},
{
"name": "17990",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17990"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4266",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.ipomonis.com/advisories/mdaemon.zip",
"refsource": "MISC",
"url": "http://www.ipomonis.com/advisories/mdaemon.zip"
},
{
"name": "17990",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17990"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-4266",
"datePublished": "2005-12-15T11:00:00Z",
"dateReserved": "2005-12-15T00:00:00Z",
"dateUpdated": "2024-09-16T18:03:49.820Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-6967 (GCVE-0-2008-6967)
Vulnerability from nvd – Published: 2009-08-13 16:00 – Updated: 2024-08-07 11:49
VLAI?
Summary
Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:49:02.503Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2008-3206",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/3206"
},
{
"name": "32142",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32142"
},
{
"name": "worldclient-html-xss(46688)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "50011",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/50011"
},
{
"name": "32355",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/32355"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-11-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2008-3206",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/3206"
},
{
"name": "32142",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32142"
},
{
"name": "worldclient-html-xss(46688)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "50011",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/50011"
},
{
"name": "32355",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/32355"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-6967",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-3206",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3206"
},
{
"name": "32142",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32142"
},
{
"name": "worldclient-html-xss(46688)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46688"
},
{
"name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
"refsource": "CONFIRM",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "50011",
"refsource": "OSVDB",
"url": "http://osvdb.org/50011"
},
{
"name": "32355",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32355"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-6967",
"datePublished": "2009-08-13T16:00:00",
"dateReserved": "2009-08-13T00:00:00",
"dateUpdated": "2024-08-07T11:49:02.503Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2003-1470 (GCVE-0-2003-1470)
Vulnerability from nvd – Published: 2007-10-24 23:00 – Updated: 2024-08-08 02:28
VLAI?
Summary
Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:28:03.647Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "7446",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/7446"
},
{
"name": "3296",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3296"
},
{
"name": "20030427 MDaemon SMTP/POP/IMAP server =\u003ev.6.7.5: IMAP buffer overflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/319879"
},
{
"name": "mdaemon-imap-create-bo(11896)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2003-04-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "7446",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/7446"
},
{
"name": "3296",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3296"
},
{
"name": "20030427 MDaemon SMTP/POP/IMAP server =\u003ev.6.7.5: IMAP buffer overflow",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/319879"
},
{
"name": "mdaemon-imap-create-bo(11896)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1470",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "7446",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/7446"
},
{
"name": "3296",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3296"
},
{
"name": "20030427 MDaemon SMTP/POP/IMAP server =\u003ev.6.7.5: IMAP buffer overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/319879"
},
{
"name": "mdaemon-imap-create-bo(11896)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11896"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2003-1470",
"datePublished": "2007-10-24T23:00:00",
"dateReserved": "2007-10-24T00:00:00",
"dateUpdated": "2024-08-08T02:28:03.647Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2003-1471 (GCVE-0-2003-1471)
Vulnerability from nvd – Published: 2007-10-24 23:00 – Updated: 2024-08-08 02:28
VLAI?
Summary
MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:28:03.612Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "mdaemon-pop3-negative-dos(11882)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882"
},
{
"name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html"
},
{
"name": "7445",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/7445"
},
{
"name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2003-04-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "mdaemon-pop3-negative-dos(11882)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882"
},
{
"name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html"
},
{
"name": "7445",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/7445"
},
{
"name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1471",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service (crash) via a (1) DELE or (2) UIDL with a negative number."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "mdaemon-pop3-negative-dos(11882)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11882"
},
{
"name": "20030428 RE: MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2003-04/0359.html"
},
{
"name": "7445",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/7445"
},
{
"name": "20030428 MDaemon SMTP/POP/IMAP server: =\u003e6.0.7: POP remote DoS",
"refsource": "BUGTRAQ",
"url": "http://archive.cert.uni-stuttgart.de/bugtraq/2003/04/msg00364.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2003-1471",
"datePublished": "2007-10-24T23:00:00",
"dateReserved": "2007-10-24T00:00:00",
"dateUpdated": "2024-08-08T02:28:03.612Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-3622 (GCVE-0-2007-3622)
Vulnerability from nvd – Published: 2007-07-09 16:00 – Updated: 2024-08-07 14:21
VLAI?
Summary
Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T14:21:36.451Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "37193",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37193"
},
{
"name": "25968",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25968"
},
{
"name": "1018342",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018342"
},
{
"name": "24787",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/24787"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "mdaemon-domainpop-dos(35285)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-07-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "37193",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37193"
},
{
"name": "25968",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25968"
},
{
"name": "1018342",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018342"
},
{
"name": "24787",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/24787"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "mdaemon-domainpop-dos(35285)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-3622",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in DomainPOP in Alt-N Technologies MDaemon before 9.61 allows remote attackers to cause a denial of service (crash) via malformed messages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "37193",
"refsource": "OSVDB",
"url": "http://osvdb.org/37193"
},
{
"name": "25968",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25968"
},
{
"name": "1018342",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018342"
},
{
"name": "24787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24787"
},
{
"name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
"refsource": "CONFIRM",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "mdaemon-domainpop-dos(35285)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35285"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-3622",
"datePublished": "2007-07-09T16:00:00",
"dateReserved": "2007-07-09T00:00:00",
"dateUpdated": "2024-08-07T14:21:36.451Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5968 (GCVE-0-2006-5968)
Vulnerability from nvd – Published: 2006-11-17 22:00 – Updated: 2024-08-07 20:12
VLAI?
Summary
MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:12:31.178Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://secunia.com/secunia_research/2006-67/advisory/"
},
{
"name": "ADV-2006-4538",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/4538"
},
{
"name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
},
{
"name": "21554",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21554"
},
{
"name": "mdaemon-folder-privilege-escalation(30331)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
},
{
"name": "1890",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/1890"
},
{
"name": "1017238",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017238"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-11-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\\APP folder, which is an untrusted search path element due to insecure permissions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"shortName": "flexera"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://secunia.com/secunia_research/2006-67/advisory/"
},
{
"name": "ADV-2006-4538",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/4538"
},
{
"name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
},
{
"name": "21554",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21554"
},
{
"name": "mdaemon-folder-privilege-escalation(30331)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
},
{
"name": "1890",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/1890"
},
{
"name": "1017238",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017238"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-5968",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\\APP folder, which is an untrusted search path element due to insecure permissions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://secunia.com/secunia_research/2006-67/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-67/advisory/"
},
{
"name": "ADV-2006-4538",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4538"
},
{
"name": "20061116 Secunia Research: MDaemon Insecure Default Directory Permissions",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/451821/100/100/threaded"
},
{
"name": "21554",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21554"
},
{
"name": "mdaemon-folder-privilege-escalation(30331)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30331"
},
{
"name": "1890",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1890"
},
{
"name": "1017238",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017238"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
"assignerShortName": "flexera",
"cveId": "CVE-2006-5968",
"datePublished": "2006-11-17T22:00:00",
"dateReserved": "2006-11-17T00:00:00",
"dateUpdated": "2024-08-07T20:12:31.178Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5709 (GCVE-0-2006-5709)
Vulnerability from nvd – Published: 2006-11-04 01:00 – Updated: 2024-08-07 20:04
VLAI?
Summary
Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a "JavaScript exploit."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:04:54.289Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "22507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22507"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "ADV-2006-4251",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/4251"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-10-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a \"JavaScript exploit.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-02-26T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "22507",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22507"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "ADV-2006-4251",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/4251"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5709",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in WorldClient in Alt-N Technologies MDaemon before 9.50 has unknown impact and attack vectors related to a \"JavaScript exploit.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "22507",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22507"
},
{
"name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
"refsource": "CONFIRM",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "ADV-2006-4251",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4251"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5709",
"datePublished": "2006-11-04T01:00:00",
"dateReserved": "2006-11-03T00:00:00",
"dateUpdated": "2024-08-07T20:04:54.289Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-5708 (GCVE-0-2006-5708)
Vulnerability from nvd – Published: 2006-11-04 01:00 – Updated: 2025-04-03 15:26
VLAI?
Summary
Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks.
Severity ?
7.5 (High)
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:04:54.460Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2006-5708",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-03T15:25:25.541724Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-03T15:26:14.870Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2006-11-04T01:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-5708",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in MDaemon and WorldClient in Alt-N Technologies MDaemon before 9.50 allow attackers to cause a denial of service (memory consumption) via unspecified vectors resulting in memory leaks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
"refsource": "CONFIRM",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-5708",
"datePublished": "2006-11-04T01:00:00.000Z",
"dateReserved": "2006-11-03T00:00:00.000Z",
"dateUpdated": "2025-04-03T15:26:14.870Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-4364 (GCVE-0-2006-4364)
Vulnerability from nvd – Published: 2006-08-25 23:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:06:07.630Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "2245",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/2245"
},
{
"name": "1016729",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016729"
},
{
"name": "ADV-2006-3361",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3361"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
},
{
"name": "mdaemon-pop3-bo(28517)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
},
{
"name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
},
{
"name": "1446",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/1446"
},
{
"name": "19651",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19651"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "21595",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21595"
},
{
"name": "28125",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/28125"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-08-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain \u0027@\u0027 characters in the (1) USER and (2) APOP commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "2245",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/2245"
},
{
"name": "1016729",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016729"
},
{
"name": "ADV-2006-3361",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3361"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
},
{
"name": "mdaemon-pop3-bo(28517)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
},
{
"name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
},
{
"name": "1446",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/1446"
},
{
"name": "19651",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19651"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "21595",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21595"
},
{
"name": "28125",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/28125"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4364",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain \u0027@\u0027 characters in the (1) USER and (2) APOP commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "2245",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2245"
},
{
"name": "1016729",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016729"
},
{
"name": "ADV-2006-3361",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3361"
},
{
"name": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04",
"refsource": "MISC",
"url": "http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04"
},
{
"name": "mdaemon-pop3-bo(28517)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28517"
},
{
"name": "20060822 MDaemon POP3 server remote buffer overflow (preauth)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/444015/100/0/threaded"
},
{
"name": "1446",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1446"
},
{
"name": "19651",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19651"
},
{
"name": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt",
"refsource": "CONFIRM",
"url": "http://files.altn.com/MDaemon/Release/RelNotes_en.txt"
},
{
"name": "21595",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21595"
},
{
"name": "28125",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28125"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4364",
"datePublished": "2006-08-25T23:00:00",
"dateReserved": "2006-08-25T00:00:00",
"dateUpdated": "2024-08-07T19:06:07.630Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-2646 (GCVE-0-2006-2646)
Vulnerability from nvd – Published: 2006-05-30 10:00 – Updated: 2024-08-07 17:58
VLAI?
Summary
Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a '"' (double quote).
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T17:58:51.774Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "18129",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/18129"
},
{
"name": "1016167",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016167"
},
{
"name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-05-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a \u0027\"\u0027 (double quote)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-10-17T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "18129",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/18129"
},
{
"name": "1016167",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016167"
},
{
"name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-2646",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a \u0027\"\u0027 (double quote)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "18129",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18129"
},
{
"name": "1016167",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016167"
},
{
"name": "20060528 *zeroday warez* MDAEMON LATEST VERSION PREAUTH",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure\u0026m=114882270912151\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-2646",
"datePublished": "2006-05-30T10:00:00",
"dateReserved": "2006-05-30T00:00:00",
"dateUpdated": "2024-08-07T17:58:51.774Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-0925 (GCVE-0-2006-0925)
Vulnerability from nvd – Published: 2006-02-28 11:00 – Updated: 2024-08-07 16:56
VLAI?
Summary
Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T16:56:13.945Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "mdaemon-imap-foldername-dos(24916)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
},
{
"name": "18921",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/18921"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.nsag.ru/vuln/888.html"
},
{
"name": "ADV-2006-0729",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/0729"
},
{
"name": "16854",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/16854"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-02-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "mdaemon-imap-foldername-dos(24916)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
},
{
"name": "18921",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/18921"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.nsag.ru/vuln/888.html"
},
{
"name": "ADV-2006-0729",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/0729"
},
{
"name": "16854",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/16854"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0925",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Format string vulnerability in the IMAP4rev1 server in Alt-N MDaemon 8.1.1 and possibly 8.1.4 allows remote attackers to cause a denial of service (CPU consumption) by creating and then listing folders whose names contain format string specifiers."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "mdaemon-imap-foldername-dos(24916)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24916"
},
{
"name": "18921",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18921"
},
{
"name": "http://www.nsag.ru/vuln/888.html",
"refsource": "MISC",
"url": "http://www.nsag.ru/vuln/888.html"
},
{
"name": "ADV-2006-0729",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0729"
},
{
"name": "16854",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16854"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-0925",
"datePublished": "2006-02-28T11:00:00",
"dateReserved": "2006-02-28T00:00:00",
"dateUpdated": "2024-08-07T16:56:13.945Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}