Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://secunia.com/secunia_research/2006-71/advisory/", "name": "http://secunia.com/secunia_research/2006-71/advisory/", "tags": ["Vendor Advisory"], "refsource": "MISC"}, {"url": "http://www.mailenable.com/hotfix/", "name": "http://www.mailenable.com/hotfix/", "tags": ["Patch"], "refsource": "CONFIRM"}, {"url": "http://securitytracker.com/id?1017276", "name": "1017276", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/23080", "name": "23080", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://securitytracker.com/id?1017319", "name": "1017319", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "SECTRACK"}, {"url": "http://www.securityfocus.com/bid/21362", "name": "21362", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "http://www.vupen.com/english/advisories/2006/4778", "name": "ADV-2006-4778", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614", "name": "mailenable-meimaps-bo(30614)", "tags": ["VDB Entry"], "refsource": "XF"}, {"url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded", "name": "20061130 Secunia Research: MailEnable IMAP Service Two Vulnerabilities", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Stack overflow in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.83 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.40 and 2.0 through 2.33, allows remote authenticated users to cause a denial of service (crash) via a long argument containing * (asterisk) and ? (question mark) characters to the DELETE command, as addressed by the ME-10020 hotfix."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-119"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2006-6291", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "authentication": "SINGLE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "impactScore": 6.9, "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2006-12-05T11:28Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:professional:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "1.83", "versionStartIncluding": "1.6"}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "2.33", "versionStartIncluding": "2.0"}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:professional:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "2.33", "versionStartIncluding": "2.0"}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "1.40", "versionStartIncluding": "1.1"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2019-10-03T17:22Z"}