mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
112 lines
3.8 KiB
JSON
112 lines
3.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2006-6290",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "1017276",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1017276"
|
|
},
|
|
{
|
|
"name": "ADV-2006-4778",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/4778"
|
|
},
|
|
{
|
|
"name": "23080",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/23080"
|
|
},
|
|
{
|
|
"name": "21362",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/21362"
|
|
},
|
|
{
|
|
"name": "1017319",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1017319"
|
|
},
|
|
{
|
|
"name": "http://www.mailenable.com/hotfix/",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.mailenable.com/hotfix/"
|
|
},
|
|
{
|
|
"name": "ADV-2006-4673",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/4673"
|
|
},
|
|
{
|
|
"name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
|
|
},
|
|
{
|
|
"name": "23047",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/23047"
|
|
},
|
|
{
|
|
"name": "mailenable-meimaps-bo(30614)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
|
|
},
|
|
{
|
|
"name": "http://secunia.com/secunia_research/2006-71/advisory/",
|
|
"refsource": "MISC",
|
|
"url": "http://secunia.com/secunia_research/2006-71/advisory/"
|
|
}
|
|
]
|
|
}
|
|
} |