mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-12 02:05:39 +00:00
78 lines
2.3 KiB
JSON
78 lines
2.3 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2005-1256",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20050524 Ipswitch IMail IMAP STATUS Remote Buffer Overflow Vulnerability",
|
|
"refsource" : "IDEFENSE",
|
|
"url" : "http://www.idefense.com/application/poi/display?id=244&type=vulnerabilities"
|
|
},
|
|
{
|
|
"name" : "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html"
|
|
},
|
|
{
|
|
"name" : "13727",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/13727"
|
|
},
|
|
{
|
|
"name" : "1014047",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1014047"
|
|
}
|
|
]
|
|
}
|
|
}
|