Centrinity First Class Internet Services 5.50 allows for the circumventing of the default 'spam' filters via the presence of '<@>' in the 'From:' field, which allows remote attackers to send spoofed email with the identity of local users.
Metrics
Affected Vendors & Products
References
History
Mon, 06 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opentext
Opentext firstclass |
|
| CPEs | cpe:2.3:a:opentext:firstclass:5.50:*:*:*:*:*:*:* | |
| Vendors & Products |
Centrinity
Centrinity centrinity Firstclass |
Opentext
Opentext firstclass |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T04:30:05.624Z
Reserved: 2001-07-27T00:00:00.000Z
Link: CVE-2001-0631
No data.
Status : Analyzed
Published: 2001-08-22T04:00:00.000
Modified: 2026-04-06T14:12:46.760
Link: CVE-2001-0631
No data.
OpenCVE Enrichment
No data.