Page 3 of 13 results (0.007 seconds)

CVSS: 5.1EPSS: 94%CPEs: 3EXPL: 2

SpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username. • https://www.exploit-db.com/exploits/16920 https://www.exploit-db.com/exploits/9914 http://secunia.com/advisories/20430 http://secunia.com/advisories/20443 http://secunia.com/advisories/20482 http://secunia.com/advisories/20531 http://secunia.com/advisories/20566 http://secunia.com/advisories/20692 http://securitytracker.com/id?1016230 http://securitytracker.com/id?1016235 http://www.debian.org/security/2006/dsa-1090 http://www.gentoo.org/security/en/glsa/glsa-200606- •

CVSS: 5.0EPSS: 16%CPEs: 1EXPL: 0

SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients ("To" addresses), which triggers a bus error in Perl. • http://issues.apache.org/SpamAssassin/show_bug.cgi?id=4570 http://lwn.net/Alerts/159300 http://osvdb.org/11581 http://secunia.com/advisories/17386 http://secunia.com/advisories/17518 http://secunia.com/advisories/17626 http://secunia.com/advisories/17666 http://secunia.com/advisories/17877 http://secunia.com/advisories/19158 http://www.gossamer-threads.com/lists/spamassassin/devel/62649 http://www.mandriva.com/security/advisories?name=MDKSA-2005:221 http://www.novell.c •

CVSS: 5.0EPSS: 21%CPEs: 3EXPL: 0

Apache SpamAssassin 3.0.1, 3.0.2, and 3.0.3 allows remote attackers to cause a denial of service (CPU consumption and slowdown) via a message with a long Content-Type header without any boundaries. • http://bugs.gentoo.org/show_bug.cgi?id=94722 http://mail-archives.apache.org/mod_mbox/spamassassin-announce/200506.mbox/%3c17072.35054.586017.822288%40proton.pathname.com%3e http://security.gentoo.org/glsa/glsa-200506-17.xml http://www.debian.org/security/2005/dsa-736 http://www.mandriva.com/security/advisories?name=MDKSA-2005:106 http://www.redhat.com/support/errata/RHSA-2005-498.html http://www.securityfocus.com/bid/13978 http://www.vuxml.org/freebsd/cc4ce06b-e01c-11d9-a8bd& •