ID CVE-2003-0121
Type cve
Reporter NVD
Modified 2016-10-17T22:29:45
Description
Clearswift MAILsweeper 4.x allows remote attackers to bypass attachment detection via an attachment that does not specify a MIME-Version header field, which is processed by some mail clients.
{"id": "CVE-2003-0121", "bulletinFamily": "NVD", "title": "CVE-2003-0121", "description": "Clearswift MAILsweeper 4.x allows remote attackers to bypass attachment detection via an attachment that does not specify a MIME-Version header field, which is processed by some mail clients.", "published": "2003-03-18T00:00:00", "modified": "2016-10-17T22:29:45", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0121", "reporter": "NVD", "references": ["http://www.securityfocus.com/bid/7044", "http://www.securityfocus.com/archive/1/316311", "http://marc.info/?l=bugtraq&m=104716030503607&w=2"], "cvelist": ["CVE-2003-0121"], "type": "cve", "lastseen": "2017-04-18T15:49:55", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:clearswift:mailsweeper:4.2", "cpe:/a:clearswift:mailsweeper:4.1", "cpe:/a:clearswift:mailsweeper:4.0", "cpe:/a:clearswift:mailsweeper:4.3"], "cvelist": ["CVE-2003-0121"], "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "Clearswift MAILsweeper 4.x allows remote attackers to bypass attachment detection via an attachment that does not specify a MIME-Version header field, which is processed by some mail clients.", "edition": 1, "hash": "c6868e660083d8e5be63147337162b484e95942e9422bbd51f68713160161470", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "8de1b414eb26272a2d94389818fb910e", "key": "description"}, {"hash": "414a0133a29cfd243115342e98f07bc1", "key": "href"}, {"hash": "c53068304c403df01203c15b7045324c", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "e5d275b3ebd62646b78320753699e02e", "key": "cvss"}, {"hash": "7898062fefb95765be8d8408987c2ec3", "key": "cpe"}, {"hash": "1b538bf3ee89c12573e318bf3b14626d", "key": "title"}, {"hash": "80f27f63c64d45b1787496363ad20771", "key": "cvelist"}, {"hash": "3853355a0a9ca3c49b010877e2589fb7", "key": "references"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "45205c77bcf27a8248bf98d8c685d988", "key": "published"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0121", "id": "CVE-2003-0121", "lastseen": "2016-09-03T03:55:00", "modified": "2008-09-05T16:33:32", "objectVersion": "1.2", "published": "2003-03-18T00:00:00", "references": ["http://www.securityfocus.com/bid/7044", "http://www.securityfocus.com/archive/1/316311", "http://marc.theaimsgroup.com/?l=bugtraq&m=104716030503607&w=2"], "reporter": "NVD", "scanner": [], "title": "CVE-2003-0121", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T03:55:00"}], "edition": 2, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "7898062fefb95765be8d8408987c2ec3"}, {"key": "cvelist", "hash": "80f27f63c64d45b1787496363ad20771"}, {"key": "cvss", "hash": "e5d275b3ebd62646b78320753699e02e"}, {"key": "description", "hash": "8de1b414eb26272a2d94389818fb910e"}, {"key": "href", "hash": "414a0133a29cfd243115342e98f07bc1"}, {"key": "modified", "hash": "acf622dc7ea726112861e39645ba01cb"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "45205c77bcf27a8248bf98d8c685d988"}, {"key": "references", "hash": "9a73cc73375b2d82723b24f7d9262f5d"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "1b538bf3ee89c12573e318bf3b14626d"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "f8de1bed48d585e2409aff5a4e7612c7462773db588784c64073ba9cc8cc379e", "viewCount": 0, "objectVersion": "1.2", "cpe": ["cpe:/a:clearswift:mailsweeper:4.2", "cpe:/a:clearswift:mailsweeper:4.1", "cpe:/a:clearswift:mailsweeper:4.0", "cpe:/a:clearswift:mailsweeper:4.3"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": [], "enchantments": {"vulnersScore": 5.0}}
{"result": {"exploitdb": [{"id": "EDB-ID:22338", "type": "exploitdb", "title": "Clearswift MailSweeper 4.x Malformed MIME Attachment Filter Bypass Vulnerability", "description": "Clearswift MailSweeper 4.x Malformed MIME Attachment Filter Bypass Vulnerability. CVE-2003-0121. Remote exploit for windows platform", "published": "2003-03-07T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/22338/", "cvelist": ["CVE-2003-0121"], "lastseen": "2016-02-02T18:31:43"}], "osvdb": [{"id": "OSVDB:8810", "type": "osvdb", "title": "MAILsweeper Missing MIME-Version Scan Bypass", "description": "# No description provided by the source\n\n## References:\n[CVE-2003-0121](https://vulners.com/cve/CVE-2003-0121)\n", "published": "2003-03-07T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:8810", "cvelist": ["CVE-2003-0121"], "lastseen": "2017-04-28T13:20:03"}]}}