CVE-2006-0631
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/02/2006
Last modified:
03/04/2025
Description
CRLF injection vulnerability in mailback.pl in Erik C. Thauvin mailback allows remote attackers to use mailback as a "spam proxy" by modifying mail headers, including recipient e-mail addresses, via newline characters in the Subject field.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:erik_c._thauvin:mailback:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://seclists.org/lists/bugtraq/2006/Feb/0094.html
- http://seclists.org/lists/bugtraq/2006/Feb/0154.html
- http://secunia.com/advisories/18748
- http://vc.thauvin.net/cvs/cgi/mailback/mailback.pl?view=log
- http://www.osvdb.org/22955
- http://www.vupen.com/english/advisories/2006/0459
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24540
- http://seclists.org/lists/bugtraq/2006/Feb/0094.html
- http://seclists.org/lists/bugtraq/2006/Feb/0154.html
- http://secunia.com/advisories/18748
- http://vc.thauvin.net/cvs/cgi/mailback/mailback.pl?view=log
- http://www.osvdb.org/22955
- http://www.vupen.com/english/advisories/2006/0459
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24540



