Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T21:44:05.691Z
Reserved: 2005-04-25T00:00:00
Link: CVE-2005-1252

No data.

Status : Modified
Published: 2005-05-25T04:00:00.000
Modified: 2024-11-20T23:56:56.477
Link: CVE-2005-1252

No data.