mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
284 lines
10 KiB
JSON
284 lines
10 KiB
JSON
{
|
|
"id": "CVE-2006-1337",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-03-21T02:06:00.000",
|
|
"lastModified": "2017-07-20T01:30:30.550",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Buffer overflow in the POP 3 (POP3) service in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 allows remote attackers to execute arbitrary code via unknown vectors before authentication."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": true,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:professional:*:*:*:*:*",
|
|
"versionEndIncluding": "1.72",
|
|
"matchCriteriaId": "3FE53A16-2225-473D-85CE-18680C76B8AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.2:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "A544CCF3-B0E8-41EB-B7C4-0ED0EA73F51B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.2a:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "CF075F8B-D289-420D-8372-7013CFBB6B24"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.5:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "E1113E29-79D8-4A51-A1B5-BCD7AF472167"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.6:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "610E70C4-C94E-495B-814C-7F2EE959D1A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.7:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "C3E0762D-0A1F-4340-8779-7EF7E5A0B8E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.17:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "44B22BCD-666B-495C-8830-71A28B1C8247"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.18:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "C32BE32D-03F0-4C17-9F89-65F5D28E16DE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.19:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "7F1FDBAB-2432-4A36-BB30-883856595EF8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.51:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "1D49A7E5-5B6A-478B-8DB7-8409FC55A68D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.52:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "C3CFCBFF-DB7E-411A-98BB-A2F942730048"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.53:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "D949EED6-7A58-46A0-ABE2-4388961115E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.54:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "B4B2B6C6-D979-4670-A2EF-DF40F536A245"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.70:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "67262650-5A63-4B83-8BE6-E241AAE4FE67"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.71:*:professional:*:*:*:*:*",
|
|
"matchCriteriaId": "A742262A-ECF2-41FD-AD82-0D458EAC8768"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:enterprise:*:*:*:*:*",
|
|
"versionEndIncluding": "1.2",
|
|
"matchCriteriaId": "C11EA525-5A5A-4C83-90C6-C401440EC75A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.00:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "0326FF49-77CA-49E3-9310-432FD350BAA4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.1:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "9378332B-CA61-4F05-B5AD-ABCD31DFC95D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.01:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "FBA7ADBD-5577-4966-AB1B-363CB5BCEE4B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.02:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "12A45F2C-AACD-4868-9B4F-B61A725EE0D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.03:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "A1DF5BF7-3729-4E92-8843-43C632CE5861"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.04:*:enterprise:*:*:*:*:*",
|
|
"matchCriteriaId": "F300C845-1CB8-41B7-9AAD-82CD8A96FC2F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:standard:*:*:*:*:*",
|
|
"versionEndIncluding": "1.92",
|
|
"matchCriteriaId": "6CB3AB7E-717B-496C-A289-4718E324A214"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.8:*:standard:*:*:*:*:*",
|
|
"matchCriteriaId": "C0FC8AD6-6780-48CA-ADCD-A81054E44FAB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.71:*:standard:*:*:*:*:*",
|
|
"matchCriteriaId": "143CBE04-3863-487D-B825-00154E8351F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.72:*:standard:*:*:*:*:*",
|
|
"matchCriteriaId": "C88F4AF1-B4C4-4A13-AA53-25768EE50135"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.90:*:standard:*:*:*:*:*",
|
|
"matchCriteriaId": "225DC78B-AEA7-4795-97C5-D281CCABFACB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.91:*:standard:*:*:*:*:*",
|
|
"matchCriteriaId": "D9A72240-954D-4363-B8F2-7D3B1875AC68"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.701:*:standard:*:*:*:*:*",
|
|
"matchCriteriaId": "F70DFB03-157E-43CD-8015-5F95B14C0220"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.702:*:standard:*:*:*:*:*",
|
|
"matchCriteriaId": "C2340571-F7B1-4F0F-BA33-82215C72A5F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.703:*:standard:*:*:*:*:*",
|
|
"matchCriteriaId": "282C4130-A381-4E23-9F36-19951250D144"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mailenable:mailenable:1.704:*:standard:*:*:*:*:*",
|
|
"matchCriteriaId": "18309658-7BF6-4E12-877D-77920545723A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1015797",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.mailenable.com/enterprisehistory.asp",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.mailenable.com/professionalhistory.asp",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.mailenable.com/standardhistory.asp",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/17162",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/1006",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25314",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |