{"id":"DEBIAN-CVE-2005-0157","details":"The confirm add-on in SmartList 3.15 and earlier allows attackers to subscribe arbitrary e-mail addresses by using a valid cookie that specifies an address other than the address for which the cookie was assigned.","modified":"2025-11-19T02:04:29.422319Z","published":"2005-05-03T04:00:00Z","upstream":["CVE-2005-0157"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2005-0157"}],"affected":[{"package":{"name":"smartlist","ecosystem":"Debian:11","purl":"pkg:deb/debian/smartlist?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.15-18"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2005-0157.json"}},{"package":{"name":"smartlist","ecosystem":"Debian:12","purl":"pkg:deb/debian/smartlist?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.15-18"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2005-0157.json"}},{"package":{"name":"smartlist","ecosystem":"Debian:13","purl":"pkg:deb/debian/smartlist?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.15-18"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2005-0157.json"}},{"package":{"name":"smartlist","ecosystem":"Debian:14","purl":"pkg:deb/debian/smartlist?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.15-18"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2005-0157.json"}}],"schema_version":"1.7.3"}