{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"MailEnable Professional version 1.6 et ant\u00e9rieures ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"MailEnable Enterprise version 1.1 et ant\u00e9rieures.","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nMailEnable est un serveur de messagerie qui pr\u00e9sente une vuln\u00e9rabilit\u00e9\nde type d\u00e9bordement de m\u00e9moire au niveau de la gestion des logs W3C.\nCette vuln\u00e9rabilit\u00e9 pourrait permettre \u00e0 un attaquant de provoquer un\nd\u00e9ni de service ou encore d'ex\u00e9cuter du code arbitraire.\n","cves":[],"links":[{"title":"Site Internet de MailEnable :","url":"http://www.mailenable.com/hotfix"},{"title":"Bulletin de s\u00e9curit\u00e9 de Secunia :","url":"http://secunia.com/advisories/17010"}],"reference":"CERTA-2005-AVI-377","revisions":[{"description":"version initiale.","revision_date":"2005-10-04T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire"},{"description":"D\u00e9ni de service"}],"summary":null,"title":"Vuln\u00e9rabilit\u00e9s dans MailEnable","vendor_advisories":[]}
