{ "schema_version": "1.4.0", "id": "GHSA-gwc7-xw2f-f6wx", "modified": "2022-05-01T06:41:35Z", "published": "2022-05-01T06:41:35Z", "aliases": [ "CVE-2006-0631" ], "details": "CRLF injection vulnerability in mailback.pl in Erik C. Thauvin mailback allows remote attackers to use mailback as a \"spam proxy\" by modifying mail headers, including recipient e-mail addresses, via newline characters in the Subject field.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0631" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24540" }, { "type": "WEB", "url": "http://seclists.org/lists/bugtraq/2006/Feb/0094.html" }, { "type": "WEB", "url": "http://seclists.org/lists/bugtraq/2006/Feb/0154.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/18748" }, { "type": "WEB", "url": "http://vc.thauvin.net/cvs/cgi/mailback/mailback.pl?view=log" }, { "type": "WEB", "url": "http://www.osvdb.org/22955" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/0459" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-02-10T11:02:00Z" } }