Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
clearswift mailsweeper for smtp 4.3 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2004-2703
Clearswift MIMEsweeper 5.0.5, when it has been upgraded from MAILsweeper for SMTP version 4.3 or MAILsweeper Business Suite I or II, allows remote malicious users to bypass scanning by including encrypted data in a mail message, which causes the message to be marked as "Clea...
Clearswift Mailsweeper Business Suite I
Clearswift Mailsweeper Business Suite Ii
Clearswift Mailsweeper For Smtp 4.3
Clearswift Mimesweeper For Web 5.0.5
7.5
CVSSv2
CVE-2003-1154
MAILsweeper for SMTP 4.3 allows remote malicious users to bypass virus protection via a mail message with a malformed zip attachment, as exploited by certain MIMAIL virus variants.
Clearswift Mailsweeper 4.3.10
Clearswift Mailsweeper 4.3.3
Clearswift Mailsweeper 4.3.4
Clearswift Mailsweeper 4.3.5
Clearswift Mailsweeper 4.2
Clearswift Mailsweeper 4.3
Clearswift Mailsweeper 4.3.7
Clearswift Mailsweeper 4.3.8
Clearswift Mailsweeper 4.0
Clearswift Mailsweeper 4.1
Clearswift Mailsweeper 4.3.6
Clearswift Mailsweeper 4.3.6 Sp1
5
CVSSv2
CVE-2004-2328
Clearswift MAILsweeper for SMTP prior to 4.3_13 allows remote malicious users to cause a denial of service (infinite loop) via an e-mail with a crafted RAR archive attached.
Clearswift Mailsweeper 4.0
Clearswift Mailsweeper 4.1
Clearswift Mailsweeper 4.3.4
Clearswift Mailsweeper 4.3.5
Clearswift Mailsweeper 4.3.13
Clearswift Mailsweeper 4.3.3
Clearswift Mailsweeper 4.3.10
Clearswift Mailsweeper 4.3.11
Clearswift Mailsweeper 4.3.7
Clearswift Mailsweeper 4.3.8
Clearswift Mailsweeper 4.2
Clearswift Mailsweeper 4.3
Clearswift Mailsweeper 4.3.6
Clearswift Mailsweeper 4.3.6 Sp1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started