Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:postfix:postfix:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB5D16A3-59DA-407B-82E4-65C39EBD3710", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6E5DF3A2-5F47-4D2A-802B-CE53872DDEFF", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A7A4BE9-7CBE-404F-B577-933AC26E6E81", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "8872C496-2430-4EA6-B417-51C6877B874A", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB9646BA-E57D-4E1D-BF1A-FA137CA00ED8", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "66B95D87-5B0B-48F6-8379-2521CFDE7CA9", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "A09799F5-6084-4F06-B851-4FEA7873BF35", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9230082E-FE88-4001-A614-43E8DD76471B", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "258010A6-6B75-4663-AD5C-E7AD48B38DEE", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "602E668A-1343-457B-B0E1-CAB3CCA05BD1", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "83C3C7F7-016F-458B-B40D-E06080552045", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "FE51A934-BFD2-4E61-9827-A934995BDCAB", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "BDF57DB8-3D17-4868-9FDF-81A0645FBC5A", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "1BDE9CC6-A7C7-4B0E-A341-E441EF9C33FB", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "7D7ECFA4-01CF-4C44-949D-7781767B724A", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "A568A8FC-7BB0-431B-8BFE-1BF28DD545B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "B2273956-8CEB-439E-8841-953580AE673D", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "9E074865-92E2-4AFC-8542-00273FDFACEC", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "1274628A-B6F8-48DA-A7B0-7629362A0383", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "4FAE9B3D-C867-4100-9F1A-1A925E6BCA2A", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "123ED520-D9A9-457E-B0FF-2164678F2FDA", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7F03CC36-4E01-4298-8BF2-208EC2126E2D", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DA763611-3C94-40EB-AC16-F6860FCBFDAC", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E8725859-159E-49A5-91F2-12A6B300AE76", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "6D3B5347-F7FD-4291-8535-9D71F9F49568", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "E2750F62-79D5-41ED-8624-4DC36A23A03D", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "C1D09CC9-07C8-42C7-B7B2-25251C8615A8", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F28A5B6A-466B-4B24-9BD4-9DE15642A724", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8E7B624-C991-4EA1-A977-6C06F57B4E2F", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E899C1C0-18D1-43DE-BC55-C3C14F5395D2", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "05F2CA7C-1BCE-4EBB-BFAA-6C27F03CAC9B", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "903BF741-FD7E-41F7-802D-88A09B7EFFFF", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7F0A444A-E6FE-4585-BA6C-6061A87C6144", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "161082B7-A757-496C-9D35-681851CEA10B", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "B02E2034-BB39-4B86-81CA-3BB93A4E4849", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "29CF0FA6-F4F6-4A4B-89A6-057F835FFE89", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0055B0EA-775F-4670-A3F9-C1676DBB97D5", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "363704AE-66A9-4B58-A57E-47748F299471", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "5226F933-9FB6-4BF6-AC3B-1A22D22F92F7", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "0066AE84-D27D-4E9B-851B-40EDFD07C0BB", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2B739C7B-93CC-4367-B006-E8A721ECBCF2", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F08A3C19-AEB6-4E0C-A41D-01024DC0A25D", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAE8A81E-3856-4908-B7B7-9CF511CA2A21", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B935272-1EC7-4C70-8299-9DC7594809EE", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "1647690F-D015-4DC4-9FB7-F5E9F0C430D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "A814997B-A612-493F-AA85-BA5A187A91FA", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "449E9764-54F4-46F9-9E4D-F2C96EC5F37E", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "DF4A15A5-0994-4A3B-B4CD-1C5D9F411FDE", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "5E3FB858-1B20-450B-9181-A1FE1C2B9DB4", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "C6BBD449-6F03-4EFE-8C87-B5014F0381F5", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "DEBD42EA-B31E-4E37-BF28-FEBB18369A18", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "B92BCC42-6E9F-44CB-A755-004B6DBD9D41", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "1B67A4AE-2C1C-49D6-9F53-05CAB51273E8", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "7A64D948-9441-492F-B9E5-DE5D5A3D7266", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "6D7BCB67-AF9E-4343-827B-D783C71BAF46", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "265AD494-E5EB-423B-9C20-62BCB1C3B9B5", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "B63D1C8C-6E55-43B1-9479-5CE7A917C501", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "208C73B6-88AF-4D8D-A7BE-8AB4E1A4F07B", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "11993437-8CE2-44A7-BEF8-D5F7410DCB52", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "E13F9414-C71A-49A7-9A84-BC3151E95598", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "546CC4D9-D2F4-4725-AD2D-200E6549BB63", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "998D1069-1CF5-42C5-8668-49D72E2D2F17", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2138A68-3F3D-4C7E-9FEB-2C8A445F2789", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "ED5E0EB5-ECC6-4573-9EA7-83E5741DA3CD", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "790C02A8-95DD-42BE-8A1C-1C6D6DDCC443", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "0A0034F2-585D-4A98-8428-996A726712DE", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "F8B162B5-DEF5-46AD-87D1-734B3B637D46", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "0DF3730A-0FFD-4C23-B758-BBA67CC9CD92", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "10E8E5E2-5674-40D5-AD86-8C4DDB442EE6", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "690EDC73-47B5-4891-86A5-37B6ED80E145", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B751BA4B-B7C8-4A87-A03C-5C91678FC832", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "08943D31-2139-45D3-A0DB-0C11C31875CC", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "591FB74F-BD86-4314-A359-739A245D2642", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "5F2EF7B2-943F-4DFA-8249-7FC0F9FB0312", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "9B3AFC1E-01FF-4F91-8C82-5C16378812C0", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "95E552B8-8B26-4DEE-BC6A-BC0B01C42474", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "66E26194-A7E6-4A99-8F55-7422A7E9BAB9", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "58097735-FE3B-48B7-B5EA-3CD530E16031", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "CA31260C-1C67-4E76-9F56-2359BFA0B197", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "58F1FC50-B6EB-48FD-A2FA-B8BEB05719DD", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A1DE90BD-B5F9-4762-B086-130AB04F3CB0", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CCD5258B-C9DE-47BD-9172-27618F220201", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "BC95B8DD-C8C6-4FC4-81A5-23D7669DA22A", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "894002C8-F3C1-4241-96FE-C088BBD0FCED", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "C91BA7D1-2A5B-4721-8E13-6520D6F0114B", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "FBE79FBB-801F-4B1E-8FB8-CB2A1FAF6EEB", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "253DB571-62B7-4015-A758-9DE55AAB8B9E", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "F7AF9D8C-B11C-4681-84CE-5C86926C85F8", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "955FBDF4-5103-4B19-A5F1-9468F73C7A54", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "4AAC0FF5-9699-4011-8C07-5DDAF13B64A4", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "1262ECC9-7496-4D6B-880E-6CA85EE5CD46", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:postfix:postfix:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5D1E6461-2F2A-49C5-9B2B-08DE418F2F7B", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5B3F710-13EF-4A36-B191-E0FCC1D98E23", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFB5988E-D04B-43B9-A980-82FD44D1D198", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "12A1021E-587D-47D3-80E8-43D9CCB4BD72", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "FAC9B923-222D-4F7F-970C-0B9ADF4E86F6", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "D31B75AE-FF82-4B70-BDEC-4B0FA791A085", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "C148A9D5-8899-4956-BE45-C4DBD4A2BE08", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "558A2B97-6582-445F-991C-4DD530E991DA", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "56509587-6CE6-4497-B571-0A014E1FE064", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "1B24CEB4-4F57-46CB-990B-AB664CEC96EE", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "5E40EEF8-F075-4B87-BDE7-C2D1A39B2F80", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:postfix:postfix:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5044BFB-4F00-4FFC-9A66-2FDC666B6C2B", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "827897F6-2A24-45EC-A072-8C02BA726069", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "9A3CFD6A-86E2-4E7B-BAC2-3163FC7DBF17", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "7705A10C-0BA3-4F04-B757-5890B6A2A860", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:postfix:postfix:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "133B8398-2495-47CD-B140-5247ECE86EE4", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D14612B0-7F74-4ED6-89F9-A11ED75A577F", "vulnerable": true}, {"criteria": "cpe:2.3:a:postfix:postfix:2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F5C105E-B22B-48B4-8DC8-5B747792C102", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method."}, {"lang": "es", "value": "El servidor SMTP en Postfix anterior a v2.5.13, v2.6.x anterior a v2.6.10, v2.7.x anterior a v2.7.4, y v2.8.x anterior a v2.8.3, cuando ciertos m\u00e9todos Cyrus SASL de autenticaci\u00f3n son activados, no crea un nuevo manejador de servidor despu\u00e9s de que la autentificaci\u00f3n falle, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria libre y ca\u00edda de demonio) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a tra\u00b4ves de un comando AUTH no v\u00e1lido con un m\u00e9todo seguido por un comando AUTH con un m\u00e9todo diferente."}], "id": "CVE-2011-1720", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2011-05-13T17:05:43.207", "references": [{"source": "cve@mitre.org", "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"}, {"source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/44500"}, {"source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"}, {"source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/8247"}, {"source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2233"}, {"source": "cve@mitre.org", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/727230"}, {"source": "cve@mitre.org", "url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html"}, {"source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"}, {"source": "cve@mitre.org", "url": "http://www.osvdb.org/72259"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.postfix.org/CVE-2011-1720.html"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.postfix.org/announcements/postfix-2.8.3.html"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/47778"}, {"source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025521"}, {"source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-1131-1"}, {"source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/44500"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8247"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2233"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/727230"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/72259"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.postfix.org/CVE-2011-1720.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.postfix.org/announcements/postfix-2.8.3.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/47778"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025521"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-1131-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}