Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-6893 | 2 Alt-n, Microsoft | 2 Worldclient, Internet Explorer | 2021-07-23 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Alt-N MDaemon WorldClient 10.0.2, when Internet Explorer 7 is used, allows remote attackers to inject arbitrary web script or HTML via a crafted img tag. | |||||
CVE-2000-0660 | 1 Alt-n | 1 Worldclient | 2017-10-09 | 5.0 MEDIUM | N/A |
The WDaemon web server for WorldClient 2.1 allows remote attackers to read arbitrary files via a .. (dot dot) attack. | |||||
CVE-2008-6967 | 1 Alt-n | 2 Mdaemon, Worldclient | 2017-08-16 | 5.0 MEDIUM | N/A |
Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893. | |||||
CVE-2005-4209 | 1 Alt-n | 2 Mdaemon, Worldclient | 2017-07-19 | 4.3 MEDIUM | N/A |
WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability. | |||||
CVE-2002-1741 | 1 Alt-n | 1 Worldclient | 2017-07-10 | 7.2 HIGH | N/A |
Directory traversal vulnerability in WorldClient.cgi in WorldClient for Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to delete arbitrary files via a ".." (dot dot) in the Attachments parameter. | |||||
CVE-2002-1740 | 1 Alt-n | 2 Mdaemon, Worldclient | 2017-07-10 | 2.1 LOW | N/A |
Buffer overflow in WorldClient.cgi in WorldClient in Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to execute arbitrary code via a long folder name (NewFolder parameter). | |||||
CVE-2005-4266 | 1 Alt-n | 2 Mdaemon, Worldclient | 2008-09-05 | 7.5 HIGH | N/A |
WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value. |