René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

195 lines
7.1 KiB
JSON

{
"id": "CVE-2003-1014",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-10-20T04:00:00.000",
"lastModified": "2017-07-11T01:29:39.947",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use multiple MIME fields with the same name, which may be interpreted differently by mail clients."
},
{
"lang": "es",
"value": "M\u00faltiples pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan m\u00faltiples campos MIME con el mismo nombre, lo que puede ser interpretado de manera distinta por clientes de correo."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*",
"matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*",
"matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=109517732328759&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17333",
"source": "cve@mitre.org"
}
]
}