CVE-2005-1902
 
Severity Score
3.6
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Directory traversal vulnerability in the IMAP service for SPA-PRO Mail @Solomon 4.00 allows remote authenticated users to read other users' mail and perform operations on arbitrary directories via .. sequences in the (1) SELECT, (2) CREATE, (3) DELETE, and (4) RENAME commands.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2005-06-08 CVE Reserved
- 2005-06-08 CVE Published
- 2024-05-15 EPSS Updated
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1014095 | Vdb Entry | |
http://www.osvdb.org/16989 | Vdb Entry | |
http://www.vupen.com/english/advisories/2005/0680 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/20860 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://www.security.org.sg/vuln/spa-promail4.html | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/15573 | 2017-07-11 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
E-post Corporation Search vendor "E-post Corporation" | Spa-pro Mail Atsolomon Search vendor "E-post Corporation" for product "Spa-pro Mail Atsolomon" | 4.00 Search vendor "E-post Corporation" for product "Spa-pro Mail Atsolomon" and version "4.00" | - |
Affected
|