{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T09:44:56.642","vulnerabilities":[{"cve":{"id":"CVE-2005-1706","sourceIdentifier":"cve@mitre.org","published":"2005-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unknown vulnerability in MailScanner 4.41.3 and earlier, related to \"incomplete reporting of viruses in zip files,\" allows remote attackers to bypass virus detection."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mailscanner:mailscanner:*:*:*:*:*:*:*:*","versionEndIncluding":"4.41.3","matchCriteriaId":"28F9D14D-2F11-4A12-BA68-5D655665D95D"},{"vulnerable":true,"criteria":"cpe:2.3:a:mailscanner:mailscanner:4.39.1:*:*:*:*:*:*:*","matchCriteriaId":"8545D994-CE45-4AE3-BF1A-113921761639"},{"vulnerable":true,"criteria":"cpe:2.3:a:mailscanner:mailscanner:4.39.4:*:*:*:*:*:*:*","matchCriteriaId":"9A240F08-748D-4635-B321-6EE575B04C57"},{"vulnerable":true,"criteria":"cpe:2.3:a:mailscanner:mailscanner:4.39.6:*:*:*:*:*:*:*","matchCriteriaId":"A5D3C0F0-47E9-4EBC-80D2-1105E2B0AF94"},{"vulnerable":true,"criteria":"cpe:2.3:a:mailscanner:mailscanner:4.40.1:*:*:*:*:*:*:*","matchCriteriaId":"695D9808-11CB-49A5-90BE-77E66C944BE4"},{"vulnerable":true,"criteria":"cpe:2.3:a:mailscanner:mailscanner:4.40.2:*:*:*:*:*:*:*","matchCriteriaId":"4ADFD03C-7880-44AF-832D-4992C08F4362"},{"vulnerable":true,"criteria":"cpe:2.3:a:mailscanner:mailscanner:4.40.4:*:*:*:*:*:*:*","matchCriteriaId":"AD738F06-8799-4BA0-96AE-BD585B906E54"},{"vulnerable":true,"criteria":"cpe:2.3:a:mailscanner:mailscanner:4.40.6:*:*:*:*:*:*:*","matchCriteriaId":"4B6B6F98-6E09-4D2C-88E6-95F3D6463DC1"},{"vulnerable":true,"criteria":"cpe:2.3:a:mailscanner:mailscanner:4.40.7:*:*:*:*:*:*:*","matchCriteriaId":"2F86939F-E85C-461B-9507-8DBBA4D41B7C"},{"vulnerable":true,"criteria":"cpe:2.3:a:mailscanner:mailscanner:4.40.8:*:*:*:*:*:*:*","matchCriteriaId":"97E5D938-9944-425B-8A89-9137910A0746"},{"vulnerable":true,"criteria":"cpe:2.3:a:mailscanner:mailscanner:4.40.11:*:*:*:*:*:*:*","matchCriteriaId":"9A9CF9D6-CE9E-423D-AD34-3FD61324FEA9"},{"vulnerable":true,"criteria":"cpe:2.3:a:mailscanner:mailscanner:4.41.1:*:*:*:*:*:*:*","matchCriteriaId":"2D14E230-0083-4040-BFE6-1098F6357917"},{"vulnerable":true,"criteria":"cpe:2.3:a:mailscanner:mailscanner:4.41.2:*:*:*:*:*:*:*","matchCriteriaId":"C6CD2A1C-AFEC-4E7C-9742-1BC9E1FC2599"}]}]}],"references":[{"url":"http://securitytracker.com/id?1014024","source":"cve@mitre.org"},{"url":"http://www.sng.ecs.soton.ac.uk/mailscanner/ChangeLog","source":"cve@mitre.org"},{"url":"http://securitytracker.com/id?1014024","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.sng.ecs.soton.ac.uk/mailscanner/ChangeLog","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"The vendor has released a fixed version (4.42.2)"}}]}