René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

284 lines
10 KiB
JSON

{
"id": "CVE-2006-1337",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-03-21T02:06:00.000",
"lastModified": "2017-07-20T01:30:30.550",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the POP 3 (POP3) service in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 allows remote attackers to execute arbitrary code via unknown vectors before authentication."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:professional:*:*:*:*:*",
"versionEndIncluding": "1.72",
"matchCriteriaId": "3FE53A16-2225-473D-85CE-18680C76B8AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.2:*:professional:*:*:*:*:*",
"matchCriteriaId": "A544CCF3-B0E8-41EB-B7C4-0ED0EA73F51B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.2a:*:professional:*:*:*:*:*",
"matchCriteriaId": "CF075F8B-D289-420D-8372-7013CFBB6B24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.5:*:professional:*:*:*:*:*",
"matchCriteriaId": "E1113E29-79D8-4A51-A1B5-BCD7AF472167"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.6:*:professional:*:*:*:*:*",
"matchCriteriaId": "610E70C4-C94E-495B-814C-7F2EE959D1A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.7:*:professional:*:*:*:*:*",
"matchCriteriaId": "C3E0762D-0A1F-4340-8779-7EF7E5A0B8E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.17:*:professional:*:*:*:*:*",
"matchCriteriaId": "44B22BCD-666B-495C-8830-71A28B1C8247"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.18:*:professional:*:*:*:*:*",
"matchCriteriaId": "C32BE32D-03F0-4C17-9F89-65F5D28E16DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.19:*:professional:*:*:*:*:*",
"matchCriteriaId": "7F1FDBAB-2432-4A36-BB30-883856595EF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.51:*:professional:*:*:*:*:*",
"matchCriteriaId": "1D49A7E5-5B6A-478B-8DB7-8409FC55A68D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.52:*:professional:*:*:*:*:*",
"matchCriteriaId": "C3CFCBFF-DB7E-411A-98BB-A2F942730048"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.53:*:professional:*:*:*:*:*",
"matchCriteriaId": "D949EED6-7A58-46A0-ABE2-4388961115E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.54:*:professional:*:*:*:*:*",
"matchCriteriaId": "B4B2B6C6-D979-4670-A2EF-DF40F536A245"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.70:*:professional:*:*:*:*:*",
"matchCriteriaId": "67262650-5A63-4B83-8BE6-E241AAE4FE67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.71:*:professional:*:*:*:*:*",
"matchCriteriaId": "A742262A-ECF2-41FD-AD82-0D458EAC8768"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:enterprise:*:*:*:*:*",
"versionEndIncluding": "1.2",
"matchCriteriaId": "C11EA525-5A5A-4C83-90C6-C401440EC75A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.00:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "0326FF49-77CA-49E3-9310-432FD350BAA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.1:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "9378332B-CA61-4F05-B5AD-ABCD31DFC95D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.01:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "FBA7ADBD-5577-4966-AB1B-363CB5BCEE4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.02:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "12A45F2C-AACD-4868-9B4F-B61A725EE0D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.03:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "A1DF5BF7-3729-4E92-8843-43C632CE5861"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.04:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "F300C845-1CB8-41B7-9AAD-82CD8A96FC2F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:*:*:standard:*:*:*:*:*",
"versionEndIncluding": "1.92",
"matchCriteriaId": "6CB3AB7E-717B-496C-A289-4718E324A214"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.8:*:standard:*:*:*:*:*",
"matchCriteriaId": "C0FC8AD6-6780-48CA-ADCD-A81054E44FAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.71:*:standard:*:*:*:*:*",
"matchCriteriaId": "143CBE04-3863-487D-B825-00154E8351F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.72:*:standard:*:*:*:*:*",
"matchCriteriaId": "C88F4AF1-B4C4-4A13-AA53-25768EE50135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.90:*:standard:*:*:*:*:*",
"matchCriteriaId": "225DC78B-AEA7-4795-97C5-D281CCABFACB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.91:*:standard:*:*:*:*:*",
"matchCriteriaId": "D9A72240-954D-4363-B8F2-7D3B1875AC68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.701:*:standard:*:*:*:*:*",
"matchCriteriaId": "F70DFB03-157E-43CD-8015-5F95B14C0220"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.702:*:standard:*:*:*:*:*",
"matchCriteriaId": "C2340571-F7B1-4F0F-BA33-82215C72A5F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.703:*:standard:*:*:*:*:*",
"matchCriteriaId": "282C4130-A381-4E23-9F36-19951250D144"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailenable:mailenable:1.704:*:standard:*:*:*:*:*",
"matchCriteriaId": "18309658-7BF6-4E12-877D-77920545723A"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1015797",
"source": "cve@mitre.org"
},
{
"url": "http://www.mailenable.com/enterprisehistory.asp",
"source": "cve@mitre.org"
},
{
"url": "http://www.mailenable.com/professionalhistory.asp",
"source": "cve@mitre.org"
},
{
"url": "http://www.mailenable.com/standardhistory.asp",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/17162",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/1006",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25314",
"source": "cve@mitre.org"
}
]
}