mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
113 lines
3.4 KiB
JSON
113 lines
3.4 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2006-6290",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/archive/1/453118/100/100/threaded"
|
|
},
|
|
{
|
|
"name" : "http://secunia.com/secunia_research/2006-71/advisory/",
|
|
"refsource" : "MISC",
|
|
"url" : "http://secunia.com/secunia_research/2006-71/advisory/"
|
|
},
|
|
{
|
|
"name" : "http://www.mailenable.com/hotfix/",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.mailenable.com/hotfix/"
|
|
},
|
|
{
|
|
"name" : "21362",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/21362"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-4673",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/4673"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-4778",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/4778"
|
|
},
|
|
{
|
|
"name" : "1017276",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1017276"
|
|
},
|
|
{
|
|
"name" : "1017319",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1017319"
|
|
},
|
|
{
|
|
"name" : "23047",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/23047"
|
|
},
|
|
{
|
|
"name" : "23080",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/23080"
|
|
},
|
|
{
|
|
"name" : "mailenable-meimaps-bo(30614)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
|
|
}
|
|
]
|
|
}
|
|
}
|