MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several "..." (triple dot) sequences in a UID FETCH command.
References
Link | Resource |
---|---|
http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html | Exploit Patch Vendor Advisory |
http://secunia.com/advisories/18134 | |
http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html | Exploit Patch Vendor Advisory |
http://secunia.com/advisories/18134 |
Configurations
History
21 Nov 2024, 00:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html - Exploit, Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18134 - |
Information
Published : 2005-12-21 11:03
Updated : 2024-11-21 00:04
NVD link : CVE-2005-4457
Mitre link : CVE-2005-4457
CVE.ORG link : CVE-2005-4457
JSON object : View
Products Affected
mailenable
- mailenable_enterprise
CWE