Page 2 of 14 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

In older versions of Sendmail, an attacker could use a pipe character to execute root commands. • https://www.cve.org/CVERecord?id=CVE-1999-0163 •

CVSS: 10.0EPSS: 3%CPEs: 1EXPL: 1

Sendmail 8.6.9 allows remote attackers to execute root commands, using ident. • https://www.exploit-db.com/exploits/20599 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0204 •

CVSS: 4.6EPSS: 0%CPEs: 29EXPL: 0

Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file. • http://www.cert.org/advisories/CA-1996-25.html •

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 1

Local users can start Sendmail in daemon mode and gain root privileges. • https://www.exploit-db.com/exploits/19556 http://www.securityfocus.com/bid/716 •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

MIME buffer overflow in Sendmail 8.8.0 and 8.8.1 gives root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0206 •