CVE-2010-3460
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
17/09/2010
Last modified:
11/04/2025
Description
Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gecad:axigen_mail_server:*:*:*:*:*:*:*:* | 7.4.1 (including) | |
| cpe:2.3:a:gecad:axigen_mail_server:-:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:gecad:axigen_mail_server:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gecad:axigen_mail_server:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gecad:axigen_mail_server:1.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gecad:axigen_mail_server:1.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gecad:axigen_mail_server:1.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gecad:axigen_mail_server:1.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gecad:axigen_mail_server:1.1.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:gecad:axigen_mail_server:1.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gecad:axigen_mail_server:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gecad:axigen_mail_server:1.2.0:beta:*:*:*:*:*:* | ||
| cpe:2.3:a:gecad:axigen_mail_server:1.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gecad:axigen_mail_server:1.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gecad:axigen_mail_server:1.2.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt
- http://secunia.com/advisories/41430
- http://www.acunetix.com/blog/news/directory-traversal-axigen/
- http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html
- http://www.osvdb.org/68027
- http://www.securityfocus.com/bid/43230
- http://www.vupen.com/english/advisories/2010/2415
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61826
- http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt
- http://secunia.com/advisories/41430
- http://www.acunetix.com/blog/news/directory-traversal-axigen/
- http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html
- http://www.osvdb.org/68027
- http://www.securityfocus.com/bid/43230
- http://www.vupen.com/english/advisories/2010/2415
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61826



