Page 10 of 47 results (0.002 seconds)

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

In Sendmail, attackers can gain root privileges via SMTP by specifying an improper "mail from" address and an invalid "rcpt to" address that would cause the mail to bounce to a program. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0203 •

CVSS: 10.0EPSS: 7%CPEs: 1EXPL: 1

The debug command in Sendmail is enabled, allowing attackers to execute commands as root. El comando de depuración de Sendmail está activado, permitiendo a atacantes ejecutar comandos como root. • https://www.exploit-db.com/exploits/19028 http://seclists.org/fulldisclosure/2019/Jun/16 http://www.openwall.com/lists/oss-security/2019/06/05/4 http://www.openwall.com/lists/oss-security/2019/06/06/1 http://www.osvdb.org/195 http://www.securityfocus.com/bid/1 •