CVE-2005-0313

Multiple directory traversal vulnerabilities in Magic Winmail Server 4.0 Build 1112 allow remote attackers to (1) upload arbitrary files via certain parameters to upload.php or (2) read arbitrary files via certain parameters to download.php, and remote authenticated users to read, create, or delete arbitrary directories and files via the IMAP commands (3) CREATE, (4) EXAMINE, (5) SELECT, or (6) DELETE.
Configurations

Configuration 1 (hide)

cpe:2.3:a:amax_information_technologies:magic_winmail_server:4.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:54

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=110685011825461&w=2 - () http://marc.info/?l=bugtraq&m=110685011825461&w=2 -
References () http://secunia.com/advisories/14053 - () http://secunia.com/advisories/14053 -
References () http://securitytracker.com/id?1013017 - () http://securitytracker.com/id?1013017 -
References () http://www.securityfocus.com/bid/12388 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/12388 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19108 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/19108 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19114 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/19114 -

Information

Published : 2005-01-27 05:00

Updated : 2024-11-20 23:54


NVD link : CVE-2005-0313

Mitre link : CVE-2005-0313

CVE.ORG link : CVE-2005-0313


JSON object : View

Products Affected

amax_information_technologies

  • magic_winmail_server