René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

195 lines
7.0 KiB
JSON

{
"id": "CVE-2003-1015",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-10-20T04:00:00.000",
"lastModified": "2017-07-11T01:29:40.010",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use whitespace in an unusual fashion, which may be interpreted differently by mail clients."
},
{
"lang": "es",
"value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan espacios en blanco de manera inusual, lo que puede ser interpretado diferentemente por clientes de correo."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*",
"matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*",
"matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=109525252118936&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9273",
"source": "cve@mitre.org"
}
]
}