CVE-2005-3811

Directory traversal vulnerability in admin/main.php in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to overwrite arbitrary files with session information via the sid parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:amax_information_technologies:magic_winmail_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:02

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0580.html - () http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0580.html -
References () http://secunia.com/advisories/16665 - Vendor Advisory () http://secunia.com/advisories/16665 - Vendor Advisory
References () http://secunia.com/secunia_research/2005-58/advisory/ - Vendor Advisory () http://secunia.com/secunia_research/2005-58/advisory/ - Vendor Advisory
References () http://securityreason.com/securityalert/195 - () http://securityreason.com/securityalert/195 -
References () http://www.osvdb.org/20925 - () http://www.osvdb.org/20925 -
References () http://www.securityfocus.com/bid/15493/ - () http://www.securityfocus.com/bid/15493/ -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/23132 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/23132 -

Information

Published : 2005-11-25 22:03

Updated : 2024-11-21 00:02


NVD link : CVE-2005-3811

Mitre link : CVE-2005-3811

CVE.ORG link : CVE-2005-3811


JSON object : View

Products Affected

amax_information_technologies

  • magic_winmail_server