Multiple directory traversal vulnerabilities in Magic Winmail Server 4.0 Build 1112 allow remote attackers to (1) upload arbitrary files via certain parameters to upload.php or (2) read arbitrary files via certain parameters to download.php, and remote authenticated users to read, create, or delete arbitrary directories and files via the IMAP commands (3) CREATE, (4) EXAMINE, (5) SELECT, or (6) DELETE.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=110685011825461&w=2 - | |
References | () http://secunia.com/advisories/14053 - | |
References | () http://securitytracker.com/id?1013017 - | |
References | () http://www.securityfocus.com/bid/12388 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19108 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19114 - |
Information
Published : 2005-01-27 05:00
Updated : 2024-11-20 23:54
NVD link : CVE-2005-0313
Mitre link : CVE-2005-0313
CVE.ORG link : CVE-2005-0313
JSON object : View
Products Affected
amax_information_technologies
- magic_winmail_server
CWE