{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T15:23:45.267","vulnerabilities":[{"cve":{"id":"CVE-2006-5210","sourceIdentifier":"cve@mitre.org","published":"2006-10-16T23:07:00.000","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in IronWebMail before 6.1.1 HotFix-17 allows remote attackers to read arbitrary files via a GET request to the IM_FILE identifier with double-url-encoded \"../\" sequences (\"%252e%252e/\")."},{"lang":"es","value":"Vulnerabilidad de atravesamiento de directorios en IronWebMail anterior a 6.1.1 HotFix-17 permite a atacantes remotos leer archivos de su elección mediante una petición GET al identificador IM_FILE con secuencias \"../\" doblemente codificadas como url (\"%252e%252e/\")."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ciphertrust:ironmail:*:*:*:*:*:*:*:*","versionEndIncluding":"6.1.1","matchCriteriaId":"0B7E39CC-F610-4397-9C88-2C9B08DFA99D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ciphertrust:ironmail:4.1:*:*:*:*:*:*:*","matchCriteriaId":"645369C8-159C-459E-9067-2D46EE7A3E5E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ciphertrust:ironmail:4.5.1:*:*:*:*:*:*:*","matchCriteriaId":"9BD16815-8709-4F64-966F-BA8FBDAC377A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ciphertrust:ironmail:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"7CCD2698-A7A2-44BC-A352-B7CA89AD3032"}]}]}],"references":[{"url":"http://secunia.com/advisories/22406","source":"cve@mitre.org"},{"url":"http://securityreason.com/securityalert/1726","source":"cve@mitre.org"},{"url":"http://securitytracker.com/id?1017069","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/448779/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/20436","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"http://www.symantec.com/enterprise/research/SYMSA-2006-010.txt","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2006/4055","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29620","source":"cve@mitre.org"},{"url":"https://supportcenter.ciphertrust.com/vulnerability/IWM501-01.html","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/22406","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securityreason.com/securityalert/1726","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securitytracker.com/id?1017069","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/448779/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/20436","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]},{"url":"http://www.symantec.com/enterprise/research/SYMSA-2006-010.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2006/4055","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29620","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://supportcenter.ciphertrust.com/vulnerability/IWM501-01.html","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"This vulnerability is addressed in the following product update:\r\nCipherTrust, IronMail, 6.1.1 HotFix-17"}}]}