Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2004-2504
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The GUI in Alt-N Technologies MDaemon 7.2 and earlier, including 6.8, executes child processes such as NOTEPAD.EXE with SYSTEM privileges when users create new files, which allows local users with physical access to gain privileges.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
MDaemon本地特权提升漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Alt-N MDaemon是一款基于Windows的邮件服务程序。 MDaemon在打开文件时没有正确丢弃特权,本地攻击者可以利用这个漏洞提升特权。 攻击者可以通过如下方法提升特权: 1、点击任务栏的邮件图标,打开 Alt-N MDaemon Pro窗口。 2、打开文件,选择新建 3、文件类型选择全部类型。 4、找到%WINDIR%\System32\ 5、运行cmd.exe获得特权。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2004-2504
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2004-2504
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2004-2504

No comments yet


Leave a comment