Directory traversal vulnerability in the IMAP service in EServ/3 3.25 allows remote authenticated users to read other user's email messages, create/rename arbitrary directories on the system, and delete empty directories via directory traversal sequences in the (1) CREATE, (2) SELECT, (3) DELETE, (4) RENAME, (5) COPY or (6) APPEND commands.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/20059 - Patch, Vendor Advisory | |
References | () http://secunia.com/secunia_research/2006-37/advisory/ - Vendor Advisory | |
References | () http://securityreason.com/securityalert/1006 - | |
References | () http://www.eserv.ru/ru/news/news_detail.php?ID=235 - Patch | |
References | () http://www.securityfocus.com/archive/1/435415/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/18179 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/2066 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26738 - |
Information
Published : 2006-06-02 00:02
Updated : 2024-11-21 00:11
NVD link : CVE-2006-2308
Mitre link : CVE-2006-2308
CVE.ORG link : CVE-2006-2308
JSON object : View
Products Affected
etype
- eserv
CWE