{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2002-0985","title":"Title"},{"category":"description","text":"Argument injection vulnerability in the mail function for PHP 4.x to 4.2.2 may allow attackers to bypass safe mode restrictions and modify command line arguments to the MTA (e.g. sendmail) in the 5th argument to mail(), altering MTA behavior and possibly executing commands.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2002-0985","url":"https://www.suse.com/security/cve/CVE-2002-0985"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"Advisory link for SuSE-SA:2002:036","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RADS3S35S2INYFUTDM3RE5MA3Y4ZK54Q/#RADS3S35S2INYFUTDM3RE5MA3Y4ZK54Q"}],"title":"SUSE CVE CVE-2002-0985","tracking":{"current_release_date":"2025-03-27T00:37:58Z","generator":{"date":"2025-03-27T00:37:58Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2002-0985","initial_release_date":"2025-03-27T00:37:58Z","revision_history":[{"date":"2025-03-27T00:37:58Z","number":"2","summary":"Current version"}],"status":"interim","version":"2"}}}