Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:gecad:axigen_mail_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FC4AA81-6053-44C4-9129-17BC364767BD", "versionEndIncluding": "7.4.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:-:beta3:*:*:*:*:*:*", "matchCriteriaId": "9C8AA4B4-B9B4-46E8-B3B6-4616DDCABB8F", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E62797EB-6B31-42C8-8070-A126B7824358", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "39DE274D-CFC3-4A07-BA41-E761C7B2492E", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B44215D-3BC3-4F69-BA25-BB245D8334E2", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "153FE68B-BF39-4A48-8661-133441E6A9FA", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4E4FB74E-F428-4D8B-8348-0BDD4640071E", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E7123D3C-EBCA-4EAE-BDB9-1BDD0DEA5AF5", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "478F93E7-0C69-4F5E-8B2B-2E594D418131", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D44F284-E5F9-49AE-81FB-FE3C8D046D59", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A72E9D23-3A65-4BE3-8867-5F96865389C9", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.0:beta:*:*:*:*:*:*", "matchCriteriaId": "0F6D81E6-B50A-4355-A3E1-8041B7328DC5", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB64A58D-FD23-44A2-9F79-5E856FDB38C6", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "69532EAC-4A32-44C8-A51B-3E39A7106F09", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "AEECFFB8-4792-42B4-BD3C-3016BE4330F0", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.5:b:*:*:*:*:*:*", "matchCriteriaId": "A22932ED-5F58-4DDD-88C6-95548E1A1AFA", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "3444AE24-8B86-459C-98C9-6820FEC95D5F", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "65C30393-380E-4728-99AB-8B2C7B81B6A7", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D919CD37-E987-4391-9602-C8C221A29919", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3407900D-7B76-4D8A-8F10-BFF3B497CD1C", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "26FFAAD5-FCF2-420B-9B91-9EAFCAB59A63", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "368A9606-ED73-48BF-B923-E51C9018F042", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0:beta:*:*:*:*:*:*", "matchCriteriaId": "001C19A6-1D99-476D-B9DB-6D9E3E5D1E8E", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "98F794BC-242C-4B7C-83FB-607EED78FD3E", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "44FB322C-AD7E-4481-95D2-CE1CAC3F5B53", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0:beta:*:*:*:*:*:*", "matchCriteriaId": "98D94943-C343-4AF4-844B-6886B4F24421", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA886A97-82AA-4488-8A7E-5EE5A292E38F", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF07D225-6227-4266-9207-5CCFCCD3371C", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BEDE33D-25F3-44E6-87EC-0D16096DFF03", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0:beta:*:*:*:*:*:*", "matchCriteriaId": "EF1B1841-99C6-45D0-97CE-EF7A2F0CF7FD", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DF74869-E66A-4E43-9286-6F30AAA8CEFE", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BDC45FBA-D58C-4775-9225-D4E0F7117510", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9392DE24-CF35-4805-911C-B7EBF5C16392", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E52309DC-D0C4-4C5A-9BA6-900361466BCB", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C89FD65-166B-40A8-921D-53A28D422219", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.1:beta:*:*:*:*:*:*", "matchCriteriaId": "B58CFD7F-985B-40BE-A783-3F63A3F3762A", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "D92B63E6-71FD-43AE-BF9C-1E498B0BF6E8", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "30879EDE-262D-4CD7-B67C-39ABEB945881", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A87B2A89-293B-4AF9-9F3A-B0C1EB401087", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.0:beta:*:*:*:*:*:*", "matchCriteriaId": "C09BD3CB-603A-41E8-97A4-EE79ED417D4F", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE805B25-80EF-4F7D-9C0F-ACE13DBC0BB2", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "07478BE4-1082-4F17-AC7C-3664E94126B3", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "42C9F3E3-1027-49CD-9A58-D8AC48F53020", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0E3AC95-B859-49DB-8AC2-3DA59862132B", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "825E857B-0335-40E4-83C8-35BE6DE46E7A", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "041F7DB5-3B50-42EC-8F82-59692E7695B9", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2:beta:*:*:*:*:*:*", "matchCriteriaId": "7077934E-3E6A-46B1-82EA-1C255B91B5E8", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "4452E962-2D15-440A-B202-64E4D108DC36", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "60997606-A019-4EEA-9448-34FE0AF53C4A", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3:beta:*:*:*:*:*:*", "matchCriteriaId": "9CEC4BBF-D686-4F1D-9A67-9265899406CD", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B478AA48-E200-41DF-AF5C-165F9EAC6A28", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "94467CF0-FA6B-43EA-9734-723DF21E0236", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9F0AFE6B-3CE6-4F7A-B0C7-79608FEF7F05", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "A71769EC-A983-42B1-96AB-FD145CA23BAD", "vulnerable": true}, {"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.4:beta:*:*:*:*:*:*", "matchCriteriaId": "1A568477-89D4-4DCF-802B-52388BC9DA33", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en la interfaz HTTP en AXIGEN Mail Server v7.4.1 para Windows permite a atacantes remotos leer archivos a su elecci\u00f3n a trav\u00e9s de un %5C (barra invertida codificada) en la URL."}], "id": "CVE-2010-3460", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2010-09-17T20:00:02.820", "references": [{"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/41430"}, {"source": "cve@mitre.org", "url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"}, {"source": "cve@mitre.org", "url": "http://www.osvdb.org/68027"}, {"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/43230"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2010/2415"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/41430"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/68027"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://www.securityfocus.com/bid/43230"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2010/2415"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}