{"api_version":"1","generated_at":"2026-04-23T15:09:25+00:00","cve":"CVE-2001-0398","urls":{"html":"https://cve.report/CVE-2001-0398","api":"https://cve.report/api/cve/CVE-2001-0398.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2001-0398","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2001-0398"},"summary":{"title":"CVE-2001-0398","description":"The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT!  to misrepresent the attachment's type with a different icon.","state":"PUBLISHED","assigner":"mitre","published_at":"2001-06-18 04:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.securityfocus.com/bid/2530","name":"http://www.securityfocus.com/bid/2530","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"],"title":"Rit Research Labs \"The Bat!\"  Concealed Attachment Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2001-04/0013.html","name":"http://archives.neohapsis.com/archives/bugtraq/2001-04/0013.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Neohapsis Archives - Bugtraq - ~..~!guano - From http-equiv@excite.com","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2001-0398","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2001-0398","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.011","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.015","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.028","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.029","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.031","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.032","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.035","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.036","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.037","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.039","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.041","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.043","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.0_build1336","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.0_build1349","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.101","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.14","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.15","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.17","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.18","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.19","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.21","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.22","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.31","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.32","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.33","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.39","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.41","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.42","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.42f","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.43","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.44","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.45","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.46","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.47","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.48","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"398","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritlabs","cpe5":"the_bat","cpe6":"1.49","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T04:21:37.237Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"2530","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/2530"},{"name":"20010402 ~..~!guano","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://archives.neohapsis.com/archives/bugtraq/2001-04/0013.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2001-04-02T00:00:00.000Z","descriptions":[{"lang":"en","value":"The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT!  to misrepresent the attachment's type with a different icon."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2003-03-21T10:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"2530","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/2530"},{"name":"20010402 ~..~!guano","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://archives.neohapsis.com/archives/bugtraq/2001-04/0013.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2001-0398","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT!  to misrepresent the attachment's type with a different icon."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"2530","refsource":"BID","url":"http://www.securityfocus.com/bid/2530"},{"name":"20010402 ~..~!guano","refsource":"BUGTRAQ","url":"http://archives.neohapsis.com/archives/bugtraq/2001-04/0013.html"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2001-0398","datePublished":"2001-05-24T04:00:00.000Z","dateReserved":"2001-05-24T00:00:00.000Z","dateUpdated":"2024-08-08T04:21:37.237Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2001-06-18 04:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.0_build1336:*:*:*:*:*:*:*","matchCriteriaId":"084EE003-1E56-4B65-AB28-358741FE468A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.0_build1349:*:*:*:*:*:*:*","matchCriteriaId":"B94CB19A-DDB1-402F-A5B6-3CDFA8639C9B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.1:*:*:*:*:*:*:*","matchCriteriaId":"26E41CE9-3727-429F-8652-ED0CEF74B2D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.011:*:*:*:*:*:*:*","matchCriteriaId":"33822378-5851-4BBA-9A98-E5D8909B27C9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.14:*:*:*:*:*:*:*","matchCriteriaId":"3B3AFB54-5BDE-4EDE-A777-6B05B44E3CE1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.15:*:*:*:*:*:*:*","matchCriteriaId":"CC04F4BA-DFA9-4FB6-A3BF-97FFD5BC031A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.015:*:*:*:*:*:*:*","matchCriteriaId":"36F2568E-1E61-4749-ADE1-1B0DCBE87B0D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.17:*:*:*:*:*:*:*","matchCriteriaId":"4FCFE1BA-D605-4B77-B571-F435FE7405B6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.18:*:*:*:*:*:*:*","matchCriteriaId":"D3296E29-B191-4EE1-9EDF-5C0AE69BDA33"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.19:*:*:*:*:*:*:*","matchCriteriaId":"9D52FF50-4D7F-44F3-80FD-4BFAC9AC5685"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.21:*:*:*:*:*:*:*","matchCriteriaId":"181A3410-54D6-485C-AC28-06E48A825C50"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.22:*:*:*:*:*:*:*","matchCriteriaId":"F05D5559-15FC-47F5-87D5-4D0E814342CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.028:*:*:*:*:*:*:*","matchCriteriaId":"544BED98-3945-48DB-928A-1A0CE3F990C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.029:*:*:*:*:*:*:*","matchCriteriaId":"85A90D9E-05D4-44BE-B7FD-57602C2307FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.31:*:*:*:*:*:*:*","matchCriteriaId":"05DDA935-C05D-46AF-B3DD-A5529C0128C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.031:*:*:*:*:*:*:*","matchCriteriaId":"3E144DEE-5213-4DDE-9930-EA516C80D7F7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.32:*:*:*:*:*:*:*","matchCriteriaId":"3399FFA7-E303-40F5-BDFA-90EADD19C208"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.032:*:*:*:*:*:*:*","matchCriteriaId":"E5C5850E-09D0-46EF-A613-F1B103CD9499"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.33:*:*:*:*:*:*:*","matchCriteriaId":"85C2B9B2-DD49-490E-86B7-135326260160"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.34:*:*:*:*:*:*:*","matchCriteriaId":"86B231CC-E436-457D-8D8D-4D1971D3FD05"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.035:*:*:*:*:*:*:*","matchCriteriaId":"E7023CE9-3DB4-4738-AF06-6F2B989668C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.35:*:*:*:*:*:*:*","matchCriteriaId":"D5F47E42-6739-4602-B25C-9CACFA977F6C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.036:*:*:*:*:*:*:*","matchCriteriaId":"43B5423C-60AE-41BE-944A-CD3902F0A17A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.36:*:*:*:*:*:*:*","matchCriteriaId":"5604D485-A03E-4210-98B5-D39D28E6F293"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.037:*:*:*:*:*:*:*","matchCriteriaId":"9F3743A1-1975-435C-9ACD-A2290780D8F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.39:*:*:*:*:*:*:*","matchCriteriaId":"BA40F4C2-9D62-469E-876A-DC5D86DDBD44"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.039:*:*:*:*:*:*:*","matchCriteriaId":"F59D78DA-8C12-49C3-B917-D63B79904212"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.041:*:*:*:*:*:*:*","matchCriteriaId":"90E7D893-E296-4EBA-AE60-C538830FBC34"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.41:*:*:*:*:*:*:*","matchCriteriaId":"8F9FF964-0F8C-4BC7-9A9B-5FC278A4B87C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.42:*:*:*:*:*:*:*","matchCriteriaId":"D638165C-8FF9-4F43-82EA-E5B0DCCB6979"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.42f:*:*:*:*:*:*:*","matchCriteriaId":"696EAFFC-E15B-4712-BAE5-BFB0CC8EF5FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.043:*:*:*:*:*:*:*","matchCriteriaId":"CC11BF56-636B-49CD-9530-5DA80F1C55B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.43:*:*:*:*:*:*:*","matchCriteriaId":"BB625E0E-5BC7-4D28-BC4B-D4BE50DDA7BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.44:*:*:*:*:*:*:*","matchCriteriaId":"1CB4C5BA-0EDD-48C7-9846-BEE538EE9F5E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.45:*:*:*:*:*:*:*","matchCriteriaId":"57FA3866-D2B1-4304-9830-F1F9D3F6D6E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.46:*:*:*:*:*:*:*","matchCriteriaId":"CD1C920F-3073-430A-9BBF-B7C678C74304"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.47:*:*:*:*:*:*:*","matchCriteriaId":"F1770FB0-8197-41A9-BBD6-895EA6CEFC51"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.48:*:*:*:*:*:*:*","matchCriteriaId":"61073DA3-6237-4EC2-8322-7F0A92390404"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.49:*:*:*:*:*:*:*","matchCriteriaId":"097487F8-5267-4C64-A0E7-E586633C4BE1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ritlabs:the_bat:1.101:*:*:*:*:*:*:*","matchCriteriaId":"06C3CD97-73DD-4273-BB6E-0071B3118997"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2001","CveId":"398","Ordinal":"1","Title":"CVE-2001-0398","CVE":"CVE-2001-0398","Year":"2001"},"notes":[{"CveYear":"2001","CveId":"398","Ordinal":"1","NoteData":"The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT!  to misrepresent the attachment's type with a different icon.","Type":"Description","Title":"CVE-2001-0398"},{"CveYear":"2001","CveId":"398","Ordinal":"2","NoteData":"2001-05-24","Type":"Other","Title":"Published"},{"CveYear":"2001","CveId":"398","Ordinal":"3","NoteData":"2003-03-21","Type":"Other","Title":"Modified"}]}}}