CVE-2005-3811

Amax Information Technologies Magic Winmail Server - Path Traversal

Title source: rule

Description

Directory traversal vulnerability in admin/main.php in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to overwrite arbitrary files with session information via the sid parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by rgod · phpwebappsphp
https://www.exploit-db.com/exploits/3622

Scores

EPSS 0.0731
EPSS Percentile 91.7%

Details

Status published
Products (1)
amax_information_technologies/magic_winmail_server < 4.2
Published Nov 25, 2005
Tracked Since Feb 18, 2026