{"api_version":"1","generated_at":"2026-04-23T14:23:24+00:00","cve":"CVE-2006-2917","urls":{"html":"https://cve.report/CVE-2006-2917","api":"https://cve.report/api/cve/CVE-2006-2917.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-2917","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-2917"},"summary":{"title":"CVE-2006-2917","description":"Directory traversal vulnerability in the IMAP server in WinGate 6.1.2.1094 and 6.1.3.1096, and possibly other versions before 6.1.4 Build 1099, allows remote authenticated users to read email of other users, or perform unauthorized operations on directories, via the (1) CREATE, (2) SELECT, (3) DELETE, (4) RENAME, (5) COPY, (6) APPEND, and (7) LIST commands.","state":"PUBLIC","assigner":"PSIRT-CNA@flexerasoftware.com","published_at":"2006-07-10 19:05:00","updated_at":"2011-03-08 02:37:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"http://www.securityfocus.com/bid/18908","name":"18908","refsource":"BID","tags":[],"title":"Qbik WinGate IMAP Service Directory Traversal Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2006/2730","name":"ADV-2006-2730","refsource":"VUPEN","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2006-48/advisory/","name":"http://secunia.com/secunia_research/2006-48/advisory/","refsource":"MISC","tags":["Vendor Advisory"],"title":"WinGate IMAP Commands Directory Traversal Vulnerability - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.wingate.com/download.php","name":"http://www.wingate.com/download.php","refsource":"MISC","tags":[],"title":"Download Qbik products","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20707","name":"20707","refsource":"SECUNIA","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - WinGate IMAP Commands Directory Traversal Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-2917","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2917","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"2917","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qbik","cpe5":"wingate","cpe6":"6.1.2.1094","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2917","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qbik","cpe5":"wingate","cpe6":"6.1.3.1096","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2917","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qbik","cpe5":"wingate","cpe6":"6.1.2.1094","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2917","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qbik","cpe5":"wingate","cpe6":"6.1.3.1096","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"PSIRT-CNA@flexerasoftware.com","ID":"CVE-2006-2917","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Directory traversal vulnerability in the IMAP server in WinGate 6.1.2.1094 and 6.1.3.1096, and possibly other versions before 6.1.4 Build 1099, allows remote authenticated users to read email of other users, or perform unauthorized operations on directories, via the (1) CREATE, (2) SELECT, (3) DELETE, (4) RENAME, (5) COPY, (6) APPEND, and (7) LIST commands."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://secunia.com/secunia_research/2006-48/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-48/advisory/"},{"name":"http://www.wingate.com/download.php","refsource":"MISC","url":"http://www.wingate.com/download.php"},{"name":"18908","refsource":"BID","url":"http://www.securityfocus.com/bid/18908"},{"name":"20707","refsource":"SECUNIA","url":"http://secunia.com/advisories/20707"},{"name":"ADV-2006-2730","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/2730"}]}},"nvd":{"publishedDate":"2006-07-10 19:05:00","lastModifiedDate":"2011-03-08 02:37:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":4.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:qbik:wingate:6.1.2.1094:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:qbik:wingate:6.1.3.1096:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"2917","Ordinal":"18237","Title":"CVE-2006-2917","CVE":"CVE-2006-2917","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"2917","Ordinal":"1","NoteData":"Directory traversal vulnerability in the IMAP server in WinGate 6.1.2.1094 and 6.1.3.1096, and possibly other versions before 6.1.4 Build 1099, allows remote authenticated users to read email of other users, or perform unauthorized operations on directories, via the (1) CREATE, (2) SELECT, (3) DELETE, (4) RENAME, (5) COPY, (6) APPEND, and (7) LIST commands.","Type":"Description","Title":null},{"CveYear":"2006","CveId":"2917","Ordinal":"2","NoteData":"2006-07-10","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"2917","Ordinal":"3","NoteData":"2009-02-26","Type":"Other","Title":"Modified"}]}}}