Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2001-0398

Опубликовано: 18 июн. 2001
Источник: nvd
CVSS2: 7.5
EPSS Низкий

Описание

The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment's type with a different icon.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:ritlabs:the_bat:1.0_build1336:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.0_build1349:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.1:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.011:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.14:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.15:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.015:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.17:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.18:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.19:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.21:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.22:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.028:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.029:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.31:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.031:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.32:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.032:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.33:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.34:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.035:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.35:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.036:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.36:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.037:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.39:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.039:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.041:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.41:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.42:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.42f:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.043:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.43:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.44:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.45:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.46:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.47:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.48:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.49:*:*:*:*:*:*:*
cpe:2.3:a:ritlabs:the_bat:1.101:*:*:*:*:*:*:*

EPSS

Процентиль: 77%
0.01053
Низкий

7.5 High

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

github
больше 3 лет назад

The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment's type with a different icon.

EPSS

Процентиль: 77%
0.01053
Низкий

7.5 High

CVSS2

Дефекты

NVD-CWE-Other