Page 3 of 16 results (0.008 seconds)

CVSS: 4.3EPSS: 5%CPEs: 8EXPL: 0

Apache SpamAssassin before 3.1.8 allows remote attackers to cause a denial of service via long URLs in malformed HTML, which triggers "massive memory usage." Apache SpamAssassin versiones anteriores a 3.1.8, permite a atacantes remotos causar una denegación de servicio por medio de URLs largas en HTML malformado, que desencadena un "massive memory usageā€ • http://fedoranews.org/cms/node/2657 http://fedoranews.org/cms/node/2659 http://osvdb.org/33207 http://rhn.redhat.com/errata/RHSA-2007-0074.html http://secunia.com/advisories/24197 http://secunia.com/advisories/24200 http://secunia.com/advisories/24250 http://secunia.com/advisories/24256 http://secunia.com/advisories/24265 http://secunia.com/advisories/24307 http://secunia.com/advisories/24889 http://security.gentoo.org/glsa/glsa-200703-02.xml http://spamassassi • CWE-399: Resource Management Errors •

CVSS: 5.1EPSS: 94%CPEs: 3EXPL: 2

SpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username. • https://www.exploit-db.com/exploits/16920 https://www.exploit-db.com/exploits/9914 http://secunia.com/advisories/20430 http://secunia.com/advisories/20443 http://secunia.com/advisories/20482 http://secunia.com/advisories/20531 http://secunia.com/advisories/20566 http://secunia.com/advisories/20692 http://securitytracker.com/id?1016230 http://securitytracker.com/id?1016235 http://www.debian.org/security/2006/dsa-1090 http://www.gentoo.org/security/en/glsa/glsa-200606- •

CVSS: 5.0EPSS: 30%CPEs: 1EXPL: 0

SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients ("To" addresses), which triggers a bus error in Perl. • http://issues.apache.org/SpamAssassin/show_bug.cgi?id=4570 http://lwn.net/Alerts/159300 http://osvdb.org/11581 http://secunia.com/advisories/17386 http://secunia.com/advisories/17518 http://secunia.com/advisories/17626 http://secunia.com/advisories/17666 http://secunia.com/advisories/17877 http://secunia.com/advisories/19158 http://www.gossamer-threads.com/lists/spamassassin/devel/62649 http://www.mandriva.com/security/advisories?name=MDKSA-2005:221 http://www.novell.c •

CVSS: 5.0EPSS: 21%CPEs: 3EXPL: 0

Apache SpamAssassin 3.0.1, 3.0.2, and 3.0.3 allows remote attackers to cause a denial of service (CPU consumption and slowdown) via a message with a long Content-Type header without any boundaries. • http://bugs.gentoo.org/show_bug.cgi?id=94722 http://mail-archives.apache.org/mod_mbox/spamassassin-announce/200506.mbox/%3c17072.35054.586017.822288%40proton.pathname.com%3e http://security.gentoo.org/glsa/glsa-200506-17.xml http://www.debian.org/security/2005/dsa-736 http://www.mandriva.com/security/advisories?name=MDKSA-2005:106 http://www.redhat.com/support/errata/RHSA-2005-498.html http://www.securityfocus.com/bid/13978 http://www.vuxml.org/freebsd/cc4ce06b-e01c-11d9-a8bd& •

CVSS: 5.0EPSS: 4%CPEs: 9EXPL: 0

SpamAssassin 2.5x, and 2.6x before 2.64, allows remote attackers to cause a denial of service via certain malformed messages. SpamAssasin 2.5x y 2.6x anteriores a 2.64 permiten a atacantes remotos causar una denegación de servicio mediante ciertos mensajes malformados. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=129337 http://marc.info/?l=spamassassin-announce&m=109168121628767&w=2 http://security.gentoo.org/glsa/glsa-200408-06.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:084 http://www.securityfocus.com/bid/10957 https://bugzilla.fedora.us/show_bug.cgi?id=2268 https://exchange.xforce.ibmcloud.com/vulnerabilities/16938 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10413 https://acces •