Description
Centrinity First Class Internet Services 5.50 allows for the circumventing of the default 'spam' filters via the presence of '<@>' in the 'From:' field, which allows remote attackers to send spoofed email with the identity of local users.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2001-0622 | Centrinity First Class Internet Services 5.50 allows for the circumventing of the default 'spam' filters via the presence of '<@>' in the 'From:' field, which allows remote attackers to send spoofed email with the identity of local users. |
References
History
Mon, 06 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opentext
Opentext firstclass |
|
| CPEs | cpe:2.3:a:opentext:firstclass:5.50:*:*:*:*:*:*:* | |
| Vendors & Products |
Centrinity
Centrinity centrinity Firstclass |
Opentext
Opentext firstclass |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T04:30:05.624Z
Reserved: 2001-07-27T00:00:00.000Z
Link: CVE-2001-0631
No data.
Status : Analyzed
Published: 2001-08-22T04:00:00.000
Modified: 2026-04-06T14:12:46.760
Link: CVE-2001-0631
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD