Filtered by vendor Alt-n Subscriptions
Filtered by product Mdaemon Subscriptions
Total 28 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2001-0584 1 Alt-n 1 Mdaemon 2026-04-16 N/A
IMAP server in Alt-N Technologies MDaemon 3.5.6 allows a local user to cause a denial of service (hang) via long (1) SELECT or (2) EXAMINE commands.
CVE-2003-1470 1 Alt-n 1 Mdaemon 2026-04-16 N/A
Buffer overflow in IMAP service in MDaemon 6.7.5 and earlier allows remote authenticated users to cause a denial of service (crash) and execute arbitrary code via a CREATE command with a long mailbox name.
CVE-2002-1539 1 Alt-n 1 Mdaemon 2026-04-16 N/A
Buffer overflow in MDaemon POP server 6.0.7 and earlier allows remote authenticated users to cause a denial of service via long (1) DELE or (2) UIDL arguments.
CVE-2004-1546 1 Alt-n 1 Mdaemon 2026-04-16 N/A
Multiple buffer overflows in MDaemon 6.5.1 allow remote attackers to cause a denial of service (application crash) via a long (1) SAML, SOML, SEND, or MAIL command to the SMTP server or (2) LIST command to the IMAP server.
CVE-2002-1738 1 Alt-n 1 Mdaemon 2026-04-16 N/A
Alt-N Technologies MDaemon 5.0.5.0 and earlier creates a default MDaemon mail account with a password of MServer, which could allow remote attackers to send anonymous email.
CVE-2001-0583 1 Alt-n 1 Mdaemon 2026-04-16 N/A
Alt-N Technologies MDaemon 3.5.4 allows a remote attacker to create a denial of service via the URL request of a MS-DOS device (such as GET /aux) to (1) the Worldclient service at port 3000, or (2) the Webconfig service at port 3001.
CVE-2000-0716 1 Alt-n 1 Mdaemon 2026-04-16 N/A
WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user's email.
CVE-2003-1200 1 Alt-n 1 Mdaemon 2026-04-16 N/A
Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi.