Show filters
48 Total Results
Displaying 41-48 of 48
Sort by:
Attacker Value
Unknown
CVE-2001-0104
Disclosure Date: February 12, 2001 (last updated February 22, 2025)
MDaemon Pro 3.5.1 and earlier allows local users to bypass the "lock server" security setting by pressing the Cancel button at the password prompt, then pressing the enter key.
0
Attacker Value
Unknown
CVE-2000-1020
Disclosure Date: December 11, 2000 (last updated February 22, 2025)
Heap overflow in Worldclient in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL.
0
Attacker Value
Unknown
CVE-2000-1021
Disclosure Date: December 11, 2000 (last updated February 22, 2025)
Heap overflow in WebConfig in Mdaemon 3.1.1 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long URL.
0
Attacker Value
Unknown
CVE-2000-0716
Disclosure Date: October 20, 2000 (last updated February 22, 2025)
WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user's email.
0
Attacker Value
Unknown
CVE-2000-0501
Disclosure Date: June 16, 2000 (last updated February 22, 2025)
Race condition in MDaemon 2.8.5.0 POP server allows local users to cause a denial of service by entering a UIDL command and quickly exiting the server.
0
Attacker Value
Unknown
CVE-2000-0399
Disclosure Date: May 24, 2000 (last updated February 22, 2025)
Buffer overflow in MDaemon POP server allows remote attackers to cause a denial of service via a long user name.
0
Attacker Value
Unknown
CVE-1999-0846
Disclosure Date: December 01, 1999 (last updated February 22, 2025)
Denial of service in MDaemon 2.7 via a large number of connection attempts.
0
Attacker Value
Unknown
CVE-1999-0844
Disclosure Date: November 24, 1999 (last updated February 22, 2025)
Denial of service in MDaemon WorldClient and WebConfig services via a long URL.
0