Page 5 of 24 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

Clearswift MAILsweeper 4.0 through 4.3.7 allows remote attackers to bypass filtering via a file attachment that contains "multiple extensions combined with large blocks of white space." • http://www.clearswift.com/download/bin/Patches/ReadMe_SMTP_438.htm http://www.securityfocus.com/bid/7568 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 2%CPEs: 4EXPL: 1

Clearswift MAILsweeper 4.x allows remote attackers to bypass attachment detection via an attachment that does not specify a MIME-Version header field, which is processed by some mail clients. Clearswift MAIL sweeper 4.x permite a atacantes remotos evitar la detección de adjuntos mediante un adjunto que no especifica un campo de cabecera MIME-Version, y que es procesado por algunos clientes de correo. • https://www.exploit-db.com/exploits/22338 http://marc.info/?l=bugtraq&m=104716030503607&w=2 http://www.securityfocus.com/archive/1/316311 http://www.securityfocus.com/bid/7044 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The File Blocker feature in Clearswift MAILsweeper for SMTP 4.2 allows remote attackers to bypass e-mail attachment filtering policies via a modified name in a Content-Type header. • http://www.mimesweeper.com/support/technotes/notes/1102.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/6801 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

MAILsweeper for SMTP 3.x does not properly handle corrupt CDA documents in a ZIP file and hangs, which allows remote attackers to cause a denial of service. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0181.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5641 •