
CVE-2006-2447 – SpamAssassin spamd Remote Command Execution
https://notcve.org/view.php?id=CVE-2006-2447
06 Jun 2006 — SpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username. • https://packetstorm.news/files/id/82332 •

CVE-2005-3351 – Mandriva Linux Security Advisory 2005.221
https://notcve.org/view.php?id=CVE-2005-3351
20 Nov 2005 — SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients ("To" addresses), which triggers a bus error in Perl. SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients, which triggers a bus error in Perl. • http://issues.apache.org/SpamAssassin/show_bug.cgi?id=4570 •

CVE-2005-1266 – Debian Linux Security Advisory 736-1
https://notcve.org/view.php?id=CVE-2005-1266
15 Jun 2005 — Apache SpamAssassin 3.0.1, 3.0.2, and 3.0.3 allows remote attackers to cause a denial of service (CPU consumption and slowdown) via a message with a long Content-Type header without any boundaries. A vulnerability was recently found in the way that SpamAssassin parses certain email headers. This vulnerability could cause SpamAssassin to consume a large number of CPU cycles when processing messages containing these headers, leading to a potential denial of service (DOS) attack. • http://bugs.gentoo.org/show_bug.cgi?id=94722 •