{"api_version":"1","generated_at":"2026-05-13T00:06:20+00:00","cve":"CVE-2005-3692","urls":{"html":"https://cve.report/CVE-2005-3692","api":"https://cve.report/api/cve/CVE-2005-3692.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-3692","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-3692"},"summary":{"title":"CVE-2005-3692","description":"Cross-site scripting (XSS) vulnerability in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) retid parameter in badlogin.php, (2) Content-Type headers in HTML mails, and (3) HTML mail attachments.","state":"PUBLISHED","assigner":"mitre","published_at":"2005-11-19 01:03:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"4.3","severity":"","vector":"AV:N/AC:M/Au:N/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"http://secunia.com/secunia_research/2005-58/advisory/","name":"http://secunia.com/secunia_research/2005-58/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/20926","name":"http://www.osvdb.org/20926","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://secunia.com/advisories/16665","name":"http://secunia.com/advisories/16665","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Winmail Server Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/15493","name":"http://www.securityfocus.com/bid/15493","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Magic Winmail Server Multiple Input Validation Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0580.html","name":"http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0580.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Neohapsis Archives - Full Disclosure List - #0580 - [Full-disclosure] Secunia Research: Winmail Server Multiple Vulnerabilities","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.osvdb.org/20928","name":"http://www.osvdb.org/20928","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.osvdb.org/20927","name":"http://www.osvdb.org/20927","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2005/2485","name":"http://www.vupen.com/english/advisories/2005/2485","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-3692","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3692","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"3692","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"amax_information_technologies","cpe5":"magic_winmail_server","cpe6":"4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T23:17:23.416Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"16665","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/16665"},{"name":"20926","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/20926"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2005-58/advisory/"},{"name":"15493","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/15493"},{"name":"20051118 Secunia Research: Winmail Server Multiple Vulnerabilities","tags":["mailing-list","x_refsource_FULLDISC","x_transferred"],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0580.html"},{"name":"ADV-2005-2485","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2005/2485"},{"name":"20927","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/20927"},{"name":"20928","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/20928"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-11-18T00:00:00.000Z","descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) retid parameter in badlogin.php, (2) Content-Type headers in HTML mails, and (3) HTML mail attachments."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2005-11-30T10:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"16665","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/16665"},{"name":"20926","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/20926"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2005-58/advisory/"},{"name":"15493","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/15493"},{"name":"20051118 Secunia Research: Winmail Server Multiple Vulnerabilities","tags":["mailing-list","x_refsource_FULLDISC"],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0580.html"},{"name":"ADV-2005-2485","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2005/2485"},{"name":"20927","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/20927"},{"name":"20928","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/20928"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2005-3692","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cross-site scripting (XSS) vulnerability in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) retid parameter in badlogin.php, (2) Content-Type headers in HTML mails, and (3) HTML mail attachments."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"16665","refsource":"SECUNIA","url":"http://secunia.com/advisories/16665"},{"name":"20926","refsource":"OSVDB","url":"http://www.osvdb.org/20926"},{"name":"http://secunia.com/secunia_research/2005-58/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2005-58/advisory/"},{"name":"15493","refsource":"BID","url":"http://www.securityfocus.com/bid/15493"},{"name":"20051118 Secunia Research: Winmail Server Multiple Vulnerabilities","refsource":"FULLDISC","url":"http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0580.html"},{"name":"ADV-2005-2485","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2005/2485"},{"name":"20927","refsource":"OSVDB","url":"http://www.osvdb.org/20927"},{"name":"20928","refsource":"OSVDB","url":"http://www.osvdb.org/20928"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2005-3692","datePublished":"2005-11-19T01:00:00.000Z","dateReserved":"2005-11-19T00:00:00.000Z","dateUpdated":"2024-08-07T23:17:23.416Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-11-19 01:03:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:amax_information_technologies:magic_winmail_server:4.2:*:*:*:*:*:*:*","matchCriteriaId":"AC14BC46-E12C-43A5-9C6E-7CC97DA08360"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"3692","Ordinal":"1","Title":"CVE-2005-3692","CVE":"CVE-2005-3692","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"3692","Ordinal":"1","NoteData":"Cross-site scripting (XSS) vulnerability in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) retid parameter in badlogin.php, (2) Content-Type headers in HTML mails, and (3) HTML mail attachments.","Type":"Description","Title":"CVE-2005-3692"},{"CveYear":"2005","CveId":"3692","Ordinal":"2","NoteData":"2005-11-18","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"3692","Ordinal":"3","NoteData":"2005-11-30","Type":"Other","Title":"Modified"}]}}}