Directory traversal vulnerability in admin/main.php in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to overwrite arbitrary files with session information via the sid parameter.
References
Configurations
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0580.html - | |
References | () http://secunia.com/advisories/16665 - Vendor Advisory | |
References | () http://secunia.com/secunia_research/2005-58/advisory/ - Vendor Advisory | |
References | () http://securityreason.com/securityalert/195 - | |
References | () http://www.osvdb.org/20925 - | |
References | () http://www.securityfocus.com/bid/15493/ - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/23132 - |
Information
Published : 2005-11-25 22:03
Updated : 2024-11-21 00:02
NVD link : CVE-2005-3811
Mitre link : CVE-2005-3811
CVE.ORG link : CVE-2005-3811
JSON object : View
Products Affected
amax_information_technologies
- magic_winmail_server
CWE