121 lines
3.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-3691",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-11-19T01:03:00.000",
"lastModified": "2011-03-08T02:26:59.627",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail directories via the mailbox name argument of the (1) create or (2) rename commands."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "FCAA0B95-5875-41CF-90BA-EF07D240FF08"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45540A37-2CBF-453F-8EFF-696B9318499F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "724E8638-CF5A-480B-89D7-0E029A0C5965"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.02:*:*:*:*:*:*:*",
"matchCriteriaId": "48B664B5-EEF9-4C5F-B23C-E4D54DBF2EC5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.03:*:*:*:*:*:*:*",
"matchCriteriaId": "E27EEFD5-19B1-4F0C-BD52-257594C37310"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:mailenable:mailenable_enterprise:1.04:*:*:*:*:*:*:*",
"matchCriteriaId": "53BB6A16-65D3-43CF-BFB4-E0616476A979"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.6",
"matchCriteriaId": "4B880760-D0E3-46C6-A12F-3D9A444C92C1"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1015239",
"source": "cve@mitre.org"
},
{
"url": "http://www.mailenable.com/hotfix/",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/15494",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2005/2484",
"source": "cve@mitre.org"
}
]
}