Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://aluigi.altervista.org/adv/maildisable-adv.txt", "name": "http://aluigi.altervista.org/adv/maildisable-adv.txt", "tags": [], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/28145", "name": "28145", "tags": ["Exploit"], "refsource": "BID"}, {"url": "http://www.securitytracker.com/id?1019565", "name": "1019565", "tags": [], "refsource": "SECTRACK"}, {"url": "http://secunia.com/advisories/29277", "name": "29277", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://securityreason.com/securityalert/3724", "name": "3724", "tags": [], "refsource": "SREASON"}, {"url": "http://www.vupen.com/english/advisories/2008/0799/references", "name": "ADV-2008-0799", "tags": [], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41058", "name": "mailenable-imapservice-bo(41058)", "tags": [], "refsource": "XF"}, {"url": "https://www.exploit-db.com/exploits/5249", "name": "5249", "tags": [], "refsource": "EXPLOIT-DB"}, {"url": "http://www.securityfocus.com/archive/1/489270/100/0/threaded", "name": "20080307 Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-119"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2008-1276", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 9.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2008-03-10T23:44Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "3.13"}, {"cpe23Uri": "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "3.13"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-11T20:31Z"}