Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "099E3C48-BF49-4CA3-AC9B-8901193FB3D3", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "DF7541A5-8A27-4567-A247-823F24F48CA1", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "FFA1B45F-E264-4C11-ADA1-A73F68A25A52", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "D116193B-5636-4284-ACBE-29B5C09B88F5", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5CF3E7C9-74EB-4C28-8471-3D3135A11DF4", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "877FD564-2C3B-4C89-A1F8-0334FBFE5D52", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "E7C02664-113F-4550-AB4C-C30E278F69B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "ADA6AE71-E793-44E3-815D-6A64F55ED83A", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2A5DF76A-74C7-45A8-938C-AB6FDDC079F1", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "A90B5EC4-379C-4835-94C7-580CBB7F7054", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "1B09F444-6306-4AE5-A9E1-EA5E19C64520", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.9.2pre2:*:*:*:*:*:*:*", "matchCriteriaId": "14FFAF52-6996-4B5E-A6B2-4A3933751CC9", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "671B7FE8-4054-4D0A-A6A3-8826BFEA8A27", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB30DD13-F065-4DD3-B9FD-10A75A0F5A39", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "582EFC53-E21D-4752-B30C-8301BEE2448F", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "1C2BF442-FE6C-471D-B359-C626187C1196", "vulnerable": true}, {"criteria": "cpe:2.3:a:nathaniel_bray:yeemp:0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "2DC2E942-E288-4AD2-A1FD-270F1E73EAE6", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Yeemp 0.9.9 and earlier does not properly encrypt inbound files, which allows remote attackers to spoof the identity of the sender."}], "id": "CVE-2004-2642", "lastModified": "2025-04-03T01:03:51.193", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2004-12-31T05:00:00.000", "references": [{"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://deekoo.net/technocracy/yeemp/#advisory"}, {"source": "cve@mitre.org", "url": "http://deekoo.net/technocracy/yeemp/changes.html"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/12795"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://securitytracker.com/id?1011586"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://www.osvdb.org/10671"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/11353"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17692"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://deekoo.net/technocracy/yeemp/#advisory"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://deekoo.net/technocracy/yeemp/changes.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/12795"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://securitytracker.com/id?1011586"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.osvdb.org/10671"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/11353"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17692"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}