ripMIME 1.3.2.3 and earlier allows remote attackers to bypass e-mail protection via a base64 MIME encoded attachment containing invalid characters that are not properly extracted.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/12201 - Vendor Advisory | |
References | () http://www.osvdb.org/8287 - | |
References | () http://www.pldaniels.com/ripmime/CHANGELOG - | |
References | () http://www.securityfocus.com/bid/10848 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/16867 - |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:53
NVD link : CVE-2004-2619
Mitre link : CVE-2004-2619
CVE.ORG link : CVE-2004-2619
JSON object : View
Products Affected
paul_l_daniels
- ripmime
CWE