mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
87 lines
2.7 KiB
JSON
87 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2005-3691",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail directories via the mailbox name argument of the (1) create or (2) rename commands."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "17633",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/17633"
|
|
},
|
|
{
|
|
"name": "ADV-2005-2484",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2005/2484"
|
|
},
|
|
{
|
|
"name": "15494",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/15494"
|
|
},
|
|
{
|
|
"name": "http://secunia.com/secunia_research/2005-59/advisory/",
|
|
"refsource": "MISC",
|
|
"url": "http://secunia.com/secunia_research/2005-59/advisory/"
|
|
},
|
|
{
|
|
"name": "http://www.mailenable.com/hotfix/",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.mailenable.com/hotfix/"
|
|
},
|
|
{
|
|
"name": "1015239",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1015239"
|
|
}
|
|
]
|
|
}
|
|
} |