Unrated severityNVD Advisory· Published Oct 17, 2006· Updated Apr 23, 2026
CVE-2006-5313
CVE-2006-5313
Description
Hastymail 1.5 and earlier before 20061008 allows remote authenticated users to send arbitrary SMTP commands by placing them after a CRLF.CRLF sequence in the smtp_message parameter. NOTE: this crosses privilege boundaries if the SMTP server configuration prevents a user from establishing a direct SMTP session. NOTE: this is a different type of issue than CVE-2006-5262.
Affected products
5cpe:2.3:a:hastymail:hastymail:*:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:hastymail:hastymail:*:*:*:*:*:*:*:*range: <=1.5
- cpe:2.3:a:hastymail:hastymail:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:hastymail:hastymail:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:hastymail:hastymail:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:hastymail:hastymail:1.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- hastymail.sourceforge.net/security.phpnvdPatch
- secunia.com/advisories/22308nvdPatchVendor Advisory
- www.securityfocus.com/bid/20424nvdPatch
- www.vupen.com/english/advisories/2006/3956nvdVendor Advisory
- www.securityfocus.com/archive/1/453417/100/0/threadednvd
- exchange.xforce.ibmcloud.com/vulnerabilities/29407nvd
News mentions
0No linked articles in our index yet.