Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Alt-n Subscribe
Filtered by product Worldclient
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2008-6893 2 Alt-n, Microsoft 2 Worldclient, Internet Explorer 2021-07-23 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in Alt-N MDaemon WorldClient 10.0.2, when Internet Explorer 7 is used, allows remote attackers to inject arbitrary web script or HTML via a crafted img tag.
CVE-2000-0660 1 Alt-n 1 Worldclient 2017-10-09 5.0 MEDIUM N/A
The WDaemon web server for WorldClient 2.1 allows remote attackers to read arbitrary files via a .. (dot dot) attack.
CVE-2008-6967 1 Alt-n 2 Mdaemon, Worldclient 2017-08-16 5.0 MEDIUM N/A
Multiple unspecified vulnerabilities in WorldClient in Alt-N MDaemon before 10.02 have unknown impact and attack vectors, probably related to cross-site scripting (XSS) and WorldClient DLL 10.0.1, a different vulnerability than CVE-2008-6893.
CVE-2005-4209 1 Alt-n 2 Mdaemon, Worldclient 2017-07-19 4.3 MEDIUM N/A
WorldClient webmail in Alt-N MDaemon 8.1.3 allows remote attackers to prevent arbitrary users from accessing their inboxes via script tags in the Subject header of an e-mail message, which prevents the user from being able to access the Inbox folder, possibly due to a cross-site scripting (XSS) vulnerability.
CVE-2002-1741 1 Alt-n 1 Worldclient 2017-07-10 7.2 HIGH N/A
Directory traversal vulnerability in WorldClient.cgi in WorldClient for Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to delete arbitrary files via a ".." (dot dot) in the Attachments parameter.
CVE-2002-1740 1 Alt-n 2 Mdaemon, Worldclient 2017-07-10 2.1 LOW N/A
Buffer overflow in WorldClient.cgi in WorldClient in Alt-N Technologies MDaemon 5.0.5.0 and earlier allows local users to execute arbitrary code via a long folder name (NewFolder parameter).
CVE-2005-4266 1 Alt-n 2 Mdaemon, Worldclient 2008-09-05 7.5 HIGH N/A
WorldClient.dll in Alt-N MDaemon and WorldClient 8.1.3 trusts a Session parameter that contains a randomly generated session ID that is associated with a username, which allows remote attackers to perform actions as other users by guessing or sniffing the random value.