Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.mailenable.com/enterprisehistory.asp", "name": "http://www.mailenable.com/enterprisehistory.asp", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.mailenable.com/professionalhistory.asp", "name": "http://www.mailenable.com/professionalhistory.asp", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.mailenable.com/standardhistory.asp", "name": "http://www.mailenable.com/standardhistory.asp", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/19288", "name": "19288", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.securityfocus.com/bid/17162", "name": "17162", "tags": [], "refsource": "BID"}, {"url": "http://securitytracker.com/id?1015797", "name": "1015797", "tags": [], "refsource": "SECTRACK"}, {"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html", "name": "20060320 [MU-200603-01] MailEnable POP3 Pre-Authentication Buffer Overflow", "tags": [], "refsource": "FULLDISC"}, {"url": "http://www.osvdb.org/24012", "name": "24012", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.vupen.com/english/advisories/2006/1006", "name": "ADV-2006-1006", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25314", "name": "mailenable-pop-authentication(25314)", "tags": [], "refsource": "XF"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Buffer overflow in the POP 3 (POP3) service in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 allows remote attackers to execute arbitrary code via unknown vectors before authentication."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-119"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2006-1337", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2006-03-21T02:06Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:*:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "1.72"}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.6:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.54:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.18:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.17:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.71:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.51:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.5:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.2a:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.53:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.52:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.70:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.19:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.7:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.2:*:professional:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.00:*:enterprise:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:*:*:enterprise:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "1.2"}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.04:*:enterprise:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.01:*:enterprise:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.03:*:enterprise:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.1:*:enterprise:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.02:*:enterprise:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.71:*:standard:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.704:*:standard:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.91:*:standard:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.90:*:standard:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:*:*:standard:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "1.92"}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.701:*:standard:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.703:*:standard:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.702:*:standard:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.8:*:standard:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:1.72:*:standard:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2017-07-20T01:30Z"}