{"osvdb": [{"lastseen": "2017-04-28T13:19:59", "bulletinFamily": "software", "cvelist": ["CVE-2000-1129"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nISS X-Force ID: 5572\n[CVE-2000-1129](https://vulners.com/cve/CVE-2000-1129)\nBugtraq ID: 1999\n", "modified": "2000-11-23T00:00:00", "published": "2000-11-23T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:4741", "id": "OSVDB:4741", "type": "osvdb", "title": "McAfee WebShield Outgoing SMTP Recipient DoS", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-02-02T14:14:45", "description": "Network Associates WebShield SMTP 4.5 Invalid Outgoing Recipient Field DoS Vulnerability. CVE-2000-1129. Dos exploit for windows platform", "published": "2000-11-23T00:00:00", "type": "exploitdb", "title": "Network Associates WebShield SMTP 4.5 - Invalid Outgoing Recipient Field DoS Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2000-1129"], "modified": "2000-11-23T00:00:00", "id": "EDB-ID:20432", "href": "https://www.exploit-db.com/exploits/20432/", "sourceData": "source: http://www.securityfocus.com/bid/1999/info\r\n\r\nNetwork Associates WebShield SMTP is an email virus scanner designed for internet gateways.\r\n\r\nIn the event that WebShield SMTP receives an outgoing email containing six \"%20\" followed by any character within the recipient field, the application will crash, resulting in an access violation error upon processing of the email. Restarting WebShield SMTP is required in order to regain normal functionality. It has been unverified as to whether or not arbitrary code can be executed on the target system if specially crafted code is inserted into the buffer. \r\n\r\nrecipient@f%20f%20f%20f%20f%20f%20f ", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/20432/"}]}