// For flags

CVE-2006-3215

 

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Clearswift MAILsweeper for SMTP before 4.3.20 and MAILsweeper for Exchange before 4.3.20 allows remote attackers to bypass the "text analysis", possibly bypassing SPAM and other filters, by sending an e-mail specifying a non-existent or unrecognized character set.

Clearswift MAILsweeper para SMTP anterior a v4.3.20 y MAILsweeper para Exchange anterior a anterior a v4.3.20 permite a atacantes remotos evitar el "text analysis", posiblemente evitando SPAM y otros filtros, mediante el envió de un e-mail especificando un conjunto de caracteres no existente.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-06-23 CVE Reserved
  • 2006-06-24 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-10-13 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Clearswift
Search vendor "Clearswift"
Mailsweeper For Exchange
Search vendor "Clearswift" for product "Mailsweeper For Exchange"
<= 4.3.19
Search vendor "Clearswift" for product "Mailsweeper For Exchange" and version " <= 4.3.19"
-
Affected
Clearswift
Search vendor "Clearswift"
Mailsweeper For Smtp
Search vendor "Clearswift" for product "Mailsweeper For Smtp"
<= 4.3.19
Search vendor "Clearswift" for product "Mailsweeper For Smtp" and version " <= 4.3.19"
-
Affected