Vulnerability Description
Centrinity First Class Internet Services 5.50 allows for the circumventing of the default 'spam' filters via the presence of '<@>' in the 'From:' field, which allows remote attackers to send spoofed email with the identity of local users.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opentext | Firstclass | 5.50 |
References
- http://archives.neohapsis.com/archives/bugtraq/2001-02/0376.htmlExploitVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2001-02/0440.htmlVendor Advisory
- http://www.securityfocus.com/bid/2423Broken Link
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6192Third Party Advisory
- http://archives.neohapsis.com/archives/bugtraq/2001-02/0376.htmlExploitVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2001-02/0440.htmlVendor Advisory
- http://www.securityfocus.com/bid/2423Broken Link
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6192Third Party Advisory
FAQ
What is CVE-2001-0631?
CVE-2001-0631 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Centrinity First Class Internet Services 5.50 allows for the circumventing of the default 'spam' filters via the presence of '<@>' in the 'From:' field, which allows remote attackers to send spoofed e...
How severe is CVE-2001-0631?
CVE-2001-0631 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0631?
Check the references section above for vendor advisories and patch information. Affected products include: Opentext Firstclass.