Search criteria

18 vulnerabilities found for visnetic_mail_server by deerfield

FKIE_CVE-2006-0817

Vulnerability from fkie_nvd - Published: 2006-07-21 14:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Absolute path directory traversal vulnerability in (a) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (b) VisNetic MailServer before 8.5.0.5 allows remote attackers to include arbitrary files via a full Windows path and drive letter in the (1) language parameter in accounts/inc/include.php and (2) lang_settings parameter in admin/inc/include.php, which is not properly sanitized by the securepath function, a related issue to CVE-2005-4556.
References
cve@mitre.orghttp://secunia.com/advisories/18953Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18966Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-12/advisory/Exploit, Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-14/advisory/Exploit, Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1016513
cve@mitre.orghttp://securitytracker.com/id?1016514
cve@mitre.orghttp://www.osvdb.org/27328
cve@mitre.orghttp://www.securityfocus.com/archive/1/440297/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/440302/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/19002Exploit, Patch
cve@mitre.orghttp://www.securityfocus.com/bid/19007
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2825
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2826
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/27773
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18953Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18966Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-12/advisory/Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-14/advisory/Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016513
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016514
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/27328
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/440297/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/440302/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19002Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19007
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2825
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2826
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/27773
Impacted products
Vendor Product Version
deerfield visnetic_mail_server 8.3.5
icewarp web_mail 5.6.0
merak mail_server 8.3.8r

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:deerfield:visnetic_mail_server:8.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA00556D-F5B0-46DA-9A86-B737DC7A8A3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icewarp:web_mail:5.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F933D19-3CFD-4DB8-8D4F-80CE3D8B1FBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:merak:mail_server:8.3.8r:*:windows:*:*:*:*:*",
              "matchCriteriaId": "A4CCD574-8BA5-4FF9-928E-D7BC9A0377B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Absolute path directory traversal vulnerability in (a) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (b) VisNetic MailServer before 8.5.0.5 allows remote attackers to include arbitrary files via a full Windows path and drive letter in the (1) language parameter in accounts/inc/include.php and (2) lang_settings parameter in admin/inc/include.php, which is not properly sanitized by the securepath function, a related issue to CVE-2005-4556."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio absoluto en (a) MERAK Mail Server para Windows 8.3.8r con anteriores IceWarp Web Mail 5.6.1 y (b) VisNetic MailServer anterior a 8.5.0.5 permite a atacantes remotos incluir archivos de su elecci\u00f3n a trav\u00e9s de una ruta completa de Windows y controlador de cartas en el par\u00e1metro (1) language en accounts/inc/include.php y (2) par\u00e1metro lang_settings en admin/inc/include.php, lo cual no es desinfectado por la funci\u00f3n securepath, un asunto relacionado con CVE-2005-4556."
    }
  ],
  "id": "CVE-2006-0817",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-07-21T14:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18953"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18966"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-12/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-14/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016513"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016514"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/27328"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19002"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19007"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2825"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2826"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27773"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18953"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18966"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-12/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-14/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016513"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016514"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/27328"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2825"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2826"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27773"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-0818

Vulnerability from fkie_nvd - Published: 2006-07-21 14:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558.
References
cve@mitre.orghttp://secunia.com/advisories/18953Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18966Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-12/advisory/Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-14/advisory/Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1016513
cve@mitre.orghttp://securitytracker.com/id?1016514
cve@mitre.orghttp://www.securityfocus.com/archive/1/440297/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/440302/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/19002Exploit, Patch
cve@mitre.orghttp://www.securityfocus.com/bid/19007
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2825
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/27780
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18953Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18966Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-12/advisory/Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-14/advisory/Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016513
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016514
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/440297/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/440302/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19002Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19007
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2825
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/27780
Impacted products
Vendor Product Version
deerfield visnetic_mail_server 8.3.5
icewarp web_mail 5.6.0
merak mail_server 8.3.8r

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:deerfield:visnetic_mail_server:8.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA00556D-F5B0-46DA-9A86-B737DC7A8A3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icewarp:web_mail:5.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F933D19-3CFD-4DB8-8D4F-80CE3D8B1FBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:merak:mail_server:8.3.8r:*:windows:*:*:*:*:*",
              "matchCriteriaId": "A4CCD574-8BA5-4FF9-928E-D7BC9A0377B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio de ruta absoluta en (1) MERAK Mail Server para Windows 8.3.8r con anteriores IceWarp Web Mail 5.6.1 y (2) VisNetic MailServer anterior a 8.5.0.5 permite a usuarios remotos validados incluir archivos de su elecci\u00f3n a trav\u00e9s del par\u00e1metro language modificado y un nombre de ruta completo Windows o UNC en el par\u00e1metro lang_settings en mail/index.html, lo cual no es saneadoo de forma adecuada por la funci\u00f3n PHP validatefolder, posiblemente debido a una soluci\u00f3n incompleta para CVE-2005-4558."
    }
  ],
  "id": "CVE-2006-0818",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-07-21T14:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18953"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18966"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-12/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-14/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016513"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016514"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19002"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19007"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2825"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27780"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18953"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18966"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-12/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-14/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016513"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016514"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2825"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27780"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-4557

Vulnerability from fkie_nvd - Published: 2005-12-28 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
dir/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, allows remote attackers to include arbitrary local files via a null byte (%00) in the lang parameter, possibly due to a directory traversal vulnerability.
Impacted products
Vendor Product Version
deerfield visnetic_mail_server 8.3.0_build1
icewarp web_mail 5.5.1
merak mail_server 8.3.0r

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:deerfield:visnetic_mail_server:8.3.0_build1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C966349-2C04-4F69-836E-423272DCD8E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icewarp:web_mail:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "17A1B67D-FE00-4E52-9947-577A0552C01E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:merak:mail_server:8.3.0r:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1C5CDAE-78A6-4F09-963D-B066795966B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "dir/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, allows remote attackers to include arbitrary local files via a null byte (%00) in the lang parameter, possibly due to a directory traversal vulnerability."
    }
  ],
  "id": "CVE-2005-4557",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-28T11:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17046"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17865"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-62/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015412"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/22079"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/16069"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23897"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17046"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17865"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-62/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015412"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/22079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/16069"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23897"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-4559

Vulnerability from fkie_nvd - Published: 2005-12-28 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters.
Impacted products
Vendor Product Version
deerfield visnetic_mail_server 8.3.0_build1
icewarp web_mail 5.5.1
merak mail_server 8.3.0r

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:deerfield:visnetic_mail_server:8.3.0_build1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C966349-2C04-4F69-836E-423272DCD8E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icewarp:web_mail:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "17A1B67D-FE00-4E52-9947-577A0552C01E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:merak:mail_server:8.3.0r:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1C5CDAE-78A6-4F09-963D-B066795966B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters."
    }
  ],
  "id": "CVE-2005-4559",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-28T11:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17046"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17865"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-62/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/299"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015412"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/22082"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/16069"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23907"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17046"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17865"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-62/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/299"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015412"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/22082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/16069"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23907"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-4558

Vulnerability from fkie_nvd - Published: 2005-12-28 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly restrict acceptable values for the language parameter to mail/settings.html before it is stored in a database, which can allow remote authenticated users to include arbitrary PHP code via a URL in a modified lang_settings parameter to mail/index.html.
References
Impacted products
Vendor Product Version
deerfield visnetic_mail_server 8.3.0_build1
icewarp web_mail 5.5.1
merak mail_server 8.3.0r

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:deerfield:visnetic_mail_server:8.3.0_build1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C966349-2C04-4F69-836E-423272DCD8E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icewarp:web_mail:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "17A1B67D-FE00-4E52-9947-577A0552C01E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:merak:mail_server:8.3.0r:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1C5CDAE-78A6-4F09-963D-B066795966B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly restrict acceptable values for the language parameter to mail/settings.html before it is stored in a database, which can allow remote authenticated users to include arbitrary PHP code via a URL in a modified lang_settings parameter to mail/index.html."
    }
  ],
  "id": "CVE-2005-4558",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-28T11:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17046"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17865"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-62/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015412"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/22080"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/22081"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/16069"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23904"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17046"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17865"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-62/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015412"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/22080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/22081"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/16069"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23904"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-4556

Vulnerability from fkie_nvd - Published: 2005-12-28 11:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
PHP remote file include vulnerability in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, when register_globals is enabled, allows remote attackers to include arbitrary local and remote PHP files via a URL in the (1) lang_settings and (2) language parameters in (a) accounts/inc/include.php and (b) admin/inc/include.php.
Impacted products
Vendor Product Version
deerfield visnetic_mail_server 8.3.0_build1
icewarp web_mail 5.5.1
merak mail_server 8.3.0r

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:deerfield:visnetic_mail_server:8.3.0_build1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C966349-2C04-4F69-836E-423272DCD8E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icewarp:web_mail:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "17A1B67D-FE00-4E52-9947-577A0552C01E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:merak:mail_server:8.3.0r:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1C5CDAE-78A6-4F09-963D-B066795966B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "PHP remote file include vulnerability in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, when register_globals is enabled, allows remote attackers to include arbitrary local and remote PHP files via a URL in the (1) lang_settings and (2) language parameters in (a) accounts/inc/include.php and (b) admin/inc/include.php."
    }
  ],
  "id": "CVE-2005-4556",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-28T11:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17046"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17865"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-62/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015412"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/22077"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/22078"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/16069"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17046"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17865"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-62/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015412"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/22077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/22078"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/16069"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2006-0817 (GCVE-0-2006-0817)

Vulnerability from cvelistv5 – Published: 2006-07-18 23:00 – Updated: 2024-08-07 16:48
VLAI?
Summary
Absolute path directory traversal vulnerability in (a) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (b) VisNetic MailServer before 8.5.0.5 allows remote attackers to include arbitrary files via a full Windows path and drive letter in the (1) language parameter in accounts/inc/include.php and (2) lang_settings parameter in admin/inc/include.php, which is not properly sanitized by the securepath function, a related issue to CVE-2005-4556.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1016514 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/19002 vdb-entryx_refsource_BID
http://securitytracker.com/id?1016513 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/18966 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/18953 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/440302/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/27328 vdb-entryx_refsource_OSVDB
http://secunia.com/secunia_research/2006-12/advisory/ x_refsource_MISC
http://secunia.com/secunia_research/2006-14/advisory/ x_refsource_MISC
http://www.securityfocus.com/archive/1/440297/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/2826 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/2825 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/19007 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:48:56.454Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1016514",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016514"
          },
          {
            "name": "19002",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19002"
          },
          {
            "name": "1016513",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016513"
          },
          {
            "name": "18966",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18966"
          },
          {
            "name": "18953",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18953"
          },
          {
            "name": "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
          },
          {
            "name": "27328",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/27328"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-12/advisory/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-14/advisory/"
          },
          {
            "name": "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
          },
          {
            "name": "ADV-2006-2826",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2826"
          },
          {
            "name": "ADV-2006-2825",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2825"
          },
          {
            "name": "19007",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19007"
          },
          {
            "name": "visnetic-include-file-include(27773)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27773"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Absolute path directory traversal vulnerability in (a) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (b) VisNetic MailServer before 8.5.0.5 allows remote attackers to include arbitrary files via a full Windows path and drive letter in the (1) language parameter in accounts/inc/include.php and (2) lang_settings parameter in admin/inc/include.php, which is not properly sanitized by the securepath function, a related issue to CVE-2005-4556."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1016514",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016514"
        },
        {
          "name": "19002",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19002"
        },
        {
          "name": "1016513",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016513"
        },
        {
          "name": "18966",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18966"
        },
        {
          "name": "18953",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18953"
        },
        {
          "name": "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
        },
        {
          "name": "27328",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/27328"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-12/advisory/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-14/advisory/"
        },
        {
          "name": "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
        },
        {
          "name": "ADV-2006-2826",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2826"
        },
        {
          "name": "ADV-2006-2825",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2825"
        },
        {
          "name": "19007",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19007"
        },
        {
          "name": "visnetic-include-file-include(27773)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27773"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0817",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Absolute path directory traversal vulnerability in (a) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (b) VisNetic MailServer before 8.5.0.5 allows remote attackers to include arbitrary files via a full Windows path and drive letter in the (1) language parameter in accounts/inc/include.php and (2) lang_settings parameter in admin/inc/include.php, which is not properly sanitized by the securepath function, a related issue to CVE-2005-4556."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1016514",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016514"
            },
            {
              "name": "19002",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19002"
            },
            {
              "name": "1016513",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016513"
            },
            {
              "name": "18966",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18966"
            },
            {
              "name": "18953",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18953"
            },
            {
              "name": "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
            },
            {
              "name": "27328",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/27328"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-12/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-12/advisory/"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-14/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-14/advisory/"
            },
            {
              "name": "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
            },
            {
              "name": "ADV-2006-2826",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2826"
            },
            {
              "name": "ADV-2006-2825",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2825"
            },
            {
              "name": "19007",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19007"
            },
            {
              "name": "visnetic-include-file-include(27773)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27773"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0817",
    "datePublished": "2006-07-18T23:00:00",
    "dateReserved": "2006-02-21T00:00:00",
    "dateUpdated": "2024-08-07T16:48:56.454Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0818 (GCVE-0-2006-0818)

Vulnerability from cvelistv5 – Published: 2006-07-18 22:00 – Updated: 2024-08-07 16:48
VLAI?
Summary
Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:48:56.506Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1016514",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016514"
          },
          {
            "name": "19002",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19002"
          },
          {
            "name": "1016513",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016513"
          },
          {
            "name": "18966",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18966"
          },
          {
            "name": "18953",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18953"
          },
          {
            "name": "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-12/advisory/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-14/advisory/"
          },
          {
            "name": "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
          },
          {
            "name": "ADV-2006-2825",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2825"
          },
          {
            "name": "19007",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19007"
          },
          {
            "name": "visnetic-language-file-include(27780)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27780"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1016514",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016514"
        },
        {
          "name": "19002",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19002"
        },
        {
          "name": "1016513",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016513"
        },
        {
          "name": "18966",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18966"
        },
        {
          "name": "18953",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18953"
        },
        {
          "name": "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-12/advisory/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-14/advisory/"
        },
        {
          "name": "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
        },
        {
          "name": "ADV-2006-2825",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2825"
        },
        {
          "name": "19007",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19007"
        },
        {
          "name": "visnetic-language-file-include(27780)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27780"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0818",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1016514",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016514"
            },
            {
              "name": "19002",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19002"
            },
            {
              "name": "1016513",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016513"
            },
            {
              "name": "18966",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18966"
            },
            {
              "name": "18953",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18953"
            },
            {
              "name": "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-12/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-12/advisory/"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-14/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-14/advisory/"
            },
            {
              "name": "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
            },
            {
              "name": "ADV-2006-2825",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2825"
            },
            {
              "name": "19007",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19007"
            },
            {
              "name": "visnetic-language-file-include(27780)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27780"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0818",
    "datePublished": "2006-07-18T22:00:00",
    "dateReserved": "2006-02-21T00:00:00",
    "dateUpdated": "2024-08-07T16:48:56.506Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4556 (GCVE-0-2005-4556)

Vulnerability from cvelistv5 – Published: 2005-12-28 11:00 – Updated: 2024-08-07 23:46
VLAI?
Summary
PHP remote file include vulnerability in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, when register_globals is enabled, allows remote attackers to include arbitrary local and remote PHP files via a URL in the (1) lang_settings and (2) language parameters in (a) accounts/inc/include.php and (b) admin/inc/include.php.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.osvdb.org/22078 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/17865 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/16069 vdb-entryx_refsource_BID
http://secunia.com/advisories/17046 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1015412 vdb-entryx_refsource_SECTRACK
http://marc.info/?l=full-disclosure&m=11357022952… mailing-listx_refsource_FULLDISC
http://secunia.com/secunia_research/2005-62/advisory/ x_refsource_MISC
http://www.securityfocus.com/archive/1/420255/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/22077 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:46:05.539Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "22078",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22078"
          },
          {
            "name": "17865",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17865"
          },
          {
            "name": "16069",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16069"
          },
          {
            "name": "17046",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17046"
          },
          {
            "name": "1015412",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015412"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-62/advisory/"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
          },
          {
            "name": "22077",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22077"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PHP remote file include vulnerability in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, when register_globals is enabled, allows remote attackers to include arbitrary local and remote PHP files via a URL in the (1) lang_settings and (2) language parameters in (a) accounts/inc/include.php and (b) admin/inc/include.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "22078",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22078"
        },
        {
          "name": "17865",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17865"
        },
        {
          "name": "16069",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16069"
        },
        {
          "name": "17046",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17046"
        },
        {
          "name": "1015412",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015412"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-62/advisory/"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
        },
        {
          "name": "22077",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22077"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4556",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PHP remote file include vulnerability in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, when register_globals is enabled, allows remote attackers to include arbitrary local and remote PHP files via a URL in the (1) lang_settings and (2) language parameters in (a) accounts/inc/include.php and (b) admin/inc/include.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "22078",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22078"
            },
            {
              "name": "17865",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17865"
            },
            {
              "name": "16069",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16069"
            },
            {
              "name": "17046",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17046"
            },
            {
              "name": "1015412",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015412"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-62/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-62/advisory/"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
            },
            {
              "name": "22077",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22077"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4556",
    "datePublished": "2005-12-28T11:00:00",
    "dateReserved": "2005-12-28T00:00:00",
    "dateUpdated": "2024-08-07T23:46:05.539Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4559 (GCVE-0-2005-4559)

Vulnerability from cvelistv5 – Published: 2005-12-28 11:00 – Updated: 2024-08-07 23:46
VLAI?
Summary
mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securityreason.com/securityalert/299 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/17865 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/16069 vdb-entryx_refsource_BID
http://secunia.com/advisories/17046 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://securitytracker.com/id?1015412 vdb-entryx_refsource_SECTRACK
http://marc.info/?l=full-disclosure&m=11357022952… mailing-listx_refsource_FULLDISC
http://secunia.com/secunia_research/2005-62/advisory/ x_refsource_MISC
http://www.securityfocus.com/archive/1/420255/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/22082 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:46:05.556Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "299",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/299"
          },
          {
            "name": "17865",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17865"
          },
          {
            "name": "16069",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16069"
          },
          {
            "name": "17046",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17046"
          },
          {
            "name": "visnetic-information-disclosure(23907)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23907"
          },
          {
            "name": "1015412",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015412"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-62/advisory/"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
          },
          {
            "name": "22082",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22082"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "299",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/299"
        },
        {
          "name": "17865",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17865"
        },
        {
          "name": "16069",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16069"
        },
        {
          "name": "17046",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17046"
        },
        {
          "name": "visnetic-information-disclosure(23907)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23907"
        },
        {
          "name": "1015412",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015412"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-62/advisory/"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
        },
        {
          "name": "22082",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22082"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4559",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "299",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/299"
            },
            {
              "name": "17865",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17865"
            },
            {
              "name": "16069",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16069"
            },
            {
              "name": "17046",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17046"
            },
            {
              "name": "visnetic-information-disclosure(23907)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23907"
            },
            {
              "name": "1015412",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015412"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-62/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-62/advisory/"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
            },
            {
              "name": "22082",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22082"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4559",
    "datePublished": "2005-12-28T11:00:00",
    "dateReserved": "2005-12-28T00:00:00",
    "dateUpdated": "2024-08-07T23:46:05.556Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4558 (GCVE-0-2005-4558)

Vulnerability from cvelistv5 – Published: 2005-12-28 11:00 – Updated: 2024-08-07 23:46
VLAI?
Summary
IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly restrict acceptable values for the language parameter to mail/settings.html before it is stored in a database, which can allow remote authenticated users to include arbitrary PHP code via a URL in a modified lang_settings parameter to mail/index.html.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/17865 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/16069 vdb-entryx_refsource_BID
http://secunia.com/advisories/17046 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1015412 vdb-entryx_refsource_SECTRACK
http://marc.info/?l=full-disclosure&m=11357022952… mailing-listx_refsource_FULLDISC
http://www.osvdb.org/22081 vdb-entryx_refsource_OSVDB
http://secunia.com/secunia_research/2005-62/advisory/ x_refsource_MISC
http://www.securityfocus.com/archive/1/420255/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/22080 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:46:05.536Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "visnetic-settings-file-include(23904)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23904"
          },
          {
            "name": "17865",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17865"
          },
          {
            "name": "16069",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16069"
          },
          {
            "name": "17046",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17046"
          },
          {
            "name": "1015412",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015412"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
          },
          {
            "name": "22081",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22081"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-62/advisory/"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
          },
          {
            "name": "22080",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22080"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly restrict acceptable values for the language parameter to mail/settings.html before it is stored in a database, which can allow remote authenticated users to include arbitrary PHP code via a URL in a modified lang_settings parameter to mail/index.html."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "visnetic-settings-file-include(23904)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23904"
        },
        {
          "name": "17865",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17865"
        },
        {
          "name": "16069",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16069"
        },
        {
          "name": "17046",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17046"
        },
        {
          "name": "1015412",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015412"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
        },
        {
          "name": "22081",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22081"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-62/advisory/"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
        },
        {
          "name": "22080",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22080"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4558",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly restrict acceptable values for the language parameter to mail/settings.html before it is stored in a database, which can allow remote authenticated users to include arbitrary PHP code via a URL in a modified lang_settings parameter to mail/index.html."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "visnetic-settings-file-include(23904)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23904"
            },
            {
              "name": "17865",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17865"
            },
            {
              "name": "16069",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16069"
            },
            {
              "name": "17046",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17046"
            },
            {
              "name": "1015412",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015412"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
            },
            {
              "name": "22081",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22081"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-62/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-62/advisory/"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
            },
            {
              "name": "22080",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22080"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4558",
    "datePublished": "2005-12-28T11:00:00",
    "dateReserved": "2005-12-28T00:00:00",
    "dateUpdated": "2024-08-07T23:46:05.536Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4557 (GCVE-0-2005-4557)

Vulnerability from cvelistv5 – Published: 2005-12-28 11:00 – Updated: 2024-08-07 23:46
VLAI?
Summary
dir/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, allows remote attackers to include arbitrary local files via a null byte (%00) in the lang parameter, possibly due to a directory traversal vulnerability.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.osvdb.org/22079 vdb-entryx_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/17865 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/16069 vdb-entryx_refsource_BID
http://secunia.com/advisories/17046 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1015412 vdb-entryx_refsource_SECTRACK
http://marc.info/?l=full-disclosure&m=11357022952… mailing-listx_refsource_FULLDISC
http://secunia.com/secunia_research/2005-62/advisory/ x_refsource_MISC
http://www.securityfocus.com/archive/1/420255/100… mailing-listx_refsource_BUGTRAQ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:46:05.516Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "22079",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22079"
          },
          {
            "name": "visnetic-scripts-file-include(23897)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23897"
          },
          {
            "name": "17865",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17865"
          },
          {
            "name": "16069",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16069"
          },
          {
            "name": "17046",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17046"
          },
          {
            "name": "1015412",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015412"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-62/advisory/"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "dir/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, allows remote attackers to include arbitrary local files via a null byte (%00) in the lang parameter, possibly due to a directory traversal vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "22079",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22079"
        },
        {
          "name": "visnetic-scripts-file-include(23897)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23897"
        },
        {
          "name": "17865",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17865"
        },
        {
          "name": "16069",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16069"
        },
        {
          "name": "17046",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17046"
        },
        {
          "name": "1015412",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015412"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-62/advisory/"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4557",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "dir/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, allows remote attackers to include arbitrary local files via a null byte (%00) in the lang parameter, possibly due to a directory traversal vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "22079",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22079"
            },
            {
              "name": "visnetic-scripts-file-include(23897)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23897"
            },
            {
              "name": "17865",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17865"
            },
            {
              "name": "16069",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16069"
            },
            {
              "name": "17046",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17046"
            },
            {
              "name": "1015412",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015412"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-62/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-62/advisory/"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4557",
    "datePublished": "2005-12-28T11:00:00",
    "dateReserved": "2005-12-28T00:00:00",
    "dateUpdated": "2024-08-07T23:46:05.516Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0817 (GCVE-0-2006-0817)

Vulnerability from nvd – Published: 2006-07-18 23:00 – Updated: 2024-08-07 16:48
VLAI?
Summary
Absolute path directory traversal vulnerability in (a) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (b) VisNetic MailServer before 8.5.0.5 allows remote attackers to include arbitrary files via a full Windows path and drive letter in the (1) language parameter in accounts/inc/include.php and (2) lang_settings parameter in admin/inc/include.php, which is not properly sanitized by the securepath function, a related issue to CVE-2005-4556.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securitytracker.com/id?1016514 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/19002 vdb-entryx_refsource_BID
http://securitytracker.com/id?1016513 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/18966 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/18953 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/440302/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/27328 vdb-entryx_refsource_OSVDB
http://secunia.com/secunia_research/2006-12/advisory/ x_refsource_MISC
http://secunia.com/secunia_research/2006-14/advisory/ x_refsource_MISC
http://www.securityfocus.com/archive/1/440297/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/2826 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/2825 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/19007 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:48:56.454Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1016514",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016514"
          },
          {
            "name": "19002",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19002"
          },
          {
            "name": "1016513",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016513"
          },
          {
            "name": "18966",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18966"
          },
          {
            "name": "18953",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18953"
          },
          {
            "name": "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
          },
          {
            "name": "27328",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/27328"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-12/advisory/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-14/advisory/"
          },
          {
            "name": "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
          },
          {
            "name": "ADV-2006-2826",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2826"
          },
          {
            "name": "ADV-2006-2825",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2825"
          },
          {
            "name": "19007",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19007"
          },
          {
            "name": "visnetic-include-file-include(27773)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27773"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Absolute path directory traversal vulnerability in (a) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (b) VisNetic MailServer before 8.5.0.5 allows remote attackers to include arbitrary files via a full Windows path and drive letter in the (1) language parameter in accounts/inc/include.php and (2) lang_settings parameter in admin/inc/include.php, which is not properly sanitized by the securepath function, a related issue to CVE-2005-4556."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1016514",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016514"
        },
        {
          "name": "19002",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19002"
        },
        {
          "name": "1016513",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016513"
        },
        {
          "name": "18966",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18966"
        },
        {
          "name": "18953",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18953"
        },
        {
          "name": "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
        },
        {
          "name": "27328",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/27328"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-12/advisory/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-14/advisory/"
        },
        {
          "name": "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
        },
        {
          "name": "ADV-2006-2826",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2826"
        },
        {
          "name": "ADV-2006-2825",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2825"
        },
        {
          "name": "19007",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19007"
        },
        {
          "name": "visnetic-include-file-include(27773)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27773"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0817",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Absolute path directory traversal vulnerability in (a) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (b) VisNetic MailServer before 8.5.0.5 allows remote attackers to include arbitrary files via a full Windows path and drive letter in the (1) language parameter in accounts/inc/include.php and (2) lang_settings parameter in admin/inc/include.php, which is not properly sanitized by the securepath function, a related issue to CVE-2005-4556."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1016514",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016514"
            },
            {
              "name": "19002",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19002"
            },
            {
              "name": "1016513",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016513"
            },
            {
              "name": "18966",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18966"
            },
            {
              "name": "18953",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18953"
            },
            {
              "name": "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
            },
            {
              "name": "27328",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/27328"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-12/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-12/advisory/"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-14/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-14/advisory/"
            },
            {
              "name": "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
            },
            {
              "name": "ADV-2006-2826",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2826"
            },
            {
              "name": "ADV-2006-2825",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2825"
            },
            {
              "name": "19007",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19007"
            },
            {
              "name": "visnetic-include-file-include(27773)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27773"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0817",
    "datePublished": "2006-07-18T23:00:00",
    "dateReserved": "2006-02-21T00:00:00",
    "dateUpdated": "2024-08-07T16:48:56.454Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0818 (GCVE-0-2006-0818)

Vulnerability from nvd – Published: 2006-07-18 22:00 – Updated: 2024-08-07 16:48
VLAI?
Summary
Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:48:56.506Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1016514",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016514"
          },
          {
            "name": "19002",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19002"
          },
          {
            "name": "1016513",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016513"
          },
          {
            "name": "18966",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18966"
          },
          {
            "name": "18953",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18953"
          },
          {
            "name": "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-12/advisory/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-14/advisory/"
          },
          {
            "name": "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
          },
          {
            "name": "ADV-2006-2825",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2825"
          },
          {
            "name": "19007",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19007"
          },
          {
            "name": "visnetic-language-file-include(27780)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27780"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1016514",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016514"
        },
        {
          "name": "19002",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19002"
        },
        {
          "name": "1016513",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016513"
        },
        {
          "name": "18966",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18966"
        },
        {
          "name": "18953",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18953"
        },
        {
          "name": "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-12/advisory/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-14/advisory/"
        },
        {
          "name": "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
        },
        {
          "name": "ADV-2006-2825",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2825"
        },
        {
          "name": "19007",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19007"
        },
        {
          "name": "visnetic-language-file-include(27780)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27780"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0818",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1016514",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016514"
            },
            {
              "name": "19002",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19002"
            },
            {
              "name": "1016513",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016513"
            },
            {
              "name": "18966",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18966"
            },
            {
              "name": "18953",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18953"
            },
            {
              "name": "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-12/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-12/advisory/"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-14/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-14/advisory/"
            },
            {
              "name": "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
            },
            {
              "name": "ADV-2006-2825",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2825"
            },
            {
              "name": "19007",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19007"
            },
            {
              "name": "visnetic-language-file-include(27780)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27780"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0818",
    "datePublished": "2006-07-18T22:00:00",
    "dateReserved": "2006-02-21T00:00:00",
    "dateUpdated": "2024-08-07T16:48:56.506Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4556 (GCVE-0-2005-4556)

Vulnerability from nvd – Published: 2005-12-28 11:00 – Updated: 2024-08-07 23:46
VLAI?
Summary
PHP remote file include vulnerability in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, when register_globals is enabled, allows remote attackers to include arbitrary local and remote PHP files via a URL in the (1) lang_settings and (2) language parameters in (a) accounts/inc/include.php and (b) admin/inc/include.php.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.osvdb.org/22078 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/17865 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/16069 vdb-entryx_refsource_BID
http://secunia.com/advisories/17046 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1015412 vdb-entryx_refsource_SECTRACK
http://marc.info/?l=full-disclosure&m=11357022952… mailing-listx_refsource_FULLDISC
http://secunia.com/secunia_research/2005-62/advisory/ x_refsource_MISC
http://www.securityfocus.com/archive/1/420255/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/22077 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:46:05.539Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "22078",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22078"
          },
          {
            "name": "17865",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17865"
          },
          {
            "name": "16069",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16069"
          },
          {
            "name": "17046",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17046"
          },
          {
            "name": "1015412",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015412"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-62/advisory/"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
          },
          {
            "name": "22077",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22077"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PHP remote file include vulnerability in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, when register_globals is enabled, allows remote attackers to include arbitrary local and remote PHP files via a URL in the (1) lang_settings and (2) language parameters in (a) accounts/inc/include.php and (b) admin/inc/include.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "22078",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22078"
        },
        {
          "name": "17865",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17865"
        },
        {
          "name": "16069",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16069"
        },
        {
          "name": "17046",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17046"
        },
        {
          "name": "1015412",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015412"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-62/advisory/"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
        },
        {
          "name": "22077",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22077"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4556",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PHP remote file include vulnerability in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, when register_globals is enabled, allows remote attackers to include arbitrary local and remote PHP files via a URL in the (1) lang_settings and (2) language parameters in (a) accounts/inc/include.php and (b) admin/inc/include.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "22078",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22078"
            },
            {
              "name": "17865",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17865"
            },
            {
              "name": "16069",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16069"
            },
            {
              "name": "17046",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17046"
            },
            {
              "name": "1015412",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015412"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-62/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-62/advisory/"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
            },
            {
              "name": "22077",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22077"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4556",
    "datePublished": "2005-12-28T11:00:00",
    "dateReserved": "2005-12-28T00:00:00",
    "dateUpdated": "2024-08-07T23:46:05.539Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4559 (GCVE-0-2005-4559)

Vulnerability from nvd – Published: 2005-12-28 11:00 – Updated: 2024-08-07 23:46
VLAI?
Summary
mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securityreason.com/securityalert/299 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/17865 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/16069 vdb-entryx_refsource_BID
http://secunia.com/advisories/17046 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://securitytracker.com/id?1015412 vdb-entryx_refsource_SECTRACK
http://marc.info/?l=full-disclosure&m=11357022952… mailing-listx_refsource_FULLDISC
http://secunia.com/secunia_research/2005-62/advisory/ x_refsource_MISC
http://www.securityfocus.com/archive/1/420255/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/22082 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:46:05.556Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "299",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/299"
          },
          {
            "name": "17865",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17865"
          },
          {
            "name": "16069",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16069"
          },
          {
            "name": "17046",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17046"
          },
          {
            "name": "visnetic-information-disclosure(23907)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23907"
          },
          {
            "name": "1015412",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015412"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-62/advisory/"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
          },
          {
            "name": "22082",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22082"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "299",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/299"
        },
        {
          "name": "17865",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17865"
        },
        {
          "name": "16069",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16069"
        },
        {
          "name": "17046",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17046"
        },
        {
          "name": "visnetic-information-disclosure(23907)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23907"
        },
        {
          "name": "1015412",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015412"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-62/advisory/"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
        },
        {
          "name": "22082",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22082"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4559",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "299",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/299"
            },
            {
              "name": "17865",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17865"
            },
            {
              "name": "16069",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16069"
            },
            {
              "name": "17046",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17046"
            },
            {
              "name": "visnetic-information-disclosure(23907)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23907"
            },
            {
              "name": "1015412",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015412"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-62/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-62/advisory/"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
            },
            {
              "name": "22082",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22082"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4559",
    "datePublished": "2005-12-28T11:00:00",
    "dateReserved": "2005-12-28T00:00:00",
    "dateUpdated": "2024-08-07T23:46:05.556Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4558 (GCVE-0-2005-4558)

Vulnerability from nvd – Published: 2005-12-28 11:00 – Updated: 2024-08-07 23:46
VLAI?
Summary
IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly restrict acceptable values for the language parameter to mail/settings.html before it is stored in a database, which can allow remote authenticated users to include arbitrary PHP code via a URL in a modified lang_settings parameter to mail/index.html.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/17865 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/16069 vdb-entryx_refsource_BID
http://secunia.com/advisories/17046 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1015412 vdb-entryx_refsource_SECTRACK
http://marc.info/?l=full-disclosure&m=11357022952… mailing-listx_refsource_FULLDISC
http://www.osvdb.org/22081 vdb-entryx_refsource_OSVDB
http://secunia.com/secunia_research/2005-62/advisory/ x_refsource_MISC
http://www.securityfocus.com/archive/1/420255/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/22080 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:46:05.536Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "visnetic-settings-file-include(23904)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23904"
          },
          {
            "name": "17865",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17865"
          },
          {
            "name": "16069",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16069"
          },
          {
            "name": "17046",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17046"
          },
          {
            "name": "1015412",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015412"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
          },
          {
            "name": "22081",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22081"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-62/advisory/"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
          },
          {
            "name": "22080",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22080"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly restrict acceptable values for the language parameter to mail/settings.html before it is stored in a database, which can allow remote authenticated users to include arbitrary PHP code via a URL in a modified lang_settings parameter to mail/index.html."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "visnetic-settings-file-include(23904)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23904"
        },
        {
          "name": "17865",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17865"
        },
        {
          "name": "16069",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16069"
        },
        {
          "name": "17046",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17046"
        },
        {
          "name": "1015412",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015412"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
        },
        {
          "name": "22081",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22081"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-62/advisory/"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
        },
        {
          "name": "22080",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22080"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4558",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly restrict acceptable values for the language parameter to mail/settings.html before it is stored in a database, which can allow remote authenticated users to include arbitrary PHP code via a URL in a modified lang_settings parameter to mail/index.html."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "visnetic-settings-file-include(23904)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23904"
            },
            {
              "name": "17865",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17865"
            },
            {
              "name": "16069",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16069"
            },
            {
              "name": "17046",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17046"
            },
            {
              "name": "1015412",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015412"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
            },
            {
              "name": "22081",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22081"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-62/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-62/advisory/"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
            },
            {
              "name": "22080",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22080"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4558",
    "datePublished": "2005-12-28T11:00:00",
    "dateReserved": "2005-12-28T00:00:00",
    "dateUpdated": "2024-08-07T23:46:05.536Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4557 (GCVE-0-2005-4557)

Vulnerability from nvd – Published: 2005-12-28 11:00 – Updated: 2024-08-07 23:46
VLAI?
Summary
dir/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, allows remote attackers to include arbitrary local files via a null byte (%00) in the lang parameter, possibly due to a directory traversal vulnerability.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.osvdb.org/22079 vdb-entryx_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/17865 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/16069 vdb-entryx_refsource_BID
http://secunia.com/advisories/17046 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1015412 vdb-entryx_refsource_SECTRACK
http://marc.info/?l=full-disclosure&m=11357022952… mailing-listx_refsource_FULLDISC
http://secunia.com/secunia_research/2005-62/advisory/ x_refsource_MISC
http://www.securityfocus.com/archive/1/420255/100… mailing-listx_refsource_BUGTRAQ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:46:05.516Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "22079",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22079"
          },
          {
            "name": "visnetic-scripts-file-include(23897)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23897"
          },
          {
            "name": "17865",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17865"
          },
          {
            "name": "16069",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16069"
          },
          {
            "name": "17046",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17046"
          },
          {
            "name": "1015412",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015412"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-62/advisory/"
          },
          {
            "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-12-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "dir/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, allows remote attackers to include arbitrary local files via a null byte (%00) in the lang parameter, possibly due to a directory traversal vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "22079",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22079"
        },
        {
          "name": "visnetic-scripts-file-include(23897)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23897"
        },
        {
          "name": "17865",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17865"
        },
        {
          "name": "16069",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16069"
        },
        {
          "name": "17046",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17046"
        },
        {
          "name": "1015412",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015412"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-62/advisory/"
        },
        {
          "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4557",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "dir/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, allows remote attackers to include arbitrary local files via a null byte (%00) in the lang parameter, possibly due to a directory traversal vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "22079",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22079"
            },
            {
              "name": "visnetic-scripts-file-include(23897)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23897"
            },
            {
              "name": "17865",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17865"
            },
            {
              "name": "16069",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16069"
            },
            {
              "name": "17046",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17046"
            },
            {
              "name": "1015412",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015412"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=113570229524828\u0026w=2"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-62/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-62/advisory/"
            },
            {
              "name": "20051227 Secunia Research: IceWarp Web Mail Multiple File InclusionVulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/420255/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4557",
    "datePublished": "2005-12-28T11:00:00",
    "dateReserved": "2005-12-28T00:00:00",
    "dateUpdated": "2024-08-07T23:46:05.516Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}