Page 3 of 15 results (0.001 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

MIME buffer overflow in Sendmail 8.8.0 and 8.8.1 gives root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0206 •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users. • http://www.securityfocus.com/bid/717 •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

In Sendmail, attackers can gain root privileges via SMTP by specifying an improper "mail from" address and an invalid "rcpt to" address that would cause the mail to bounce to a program. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0203 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Sendmail WIZ command enabled, allowing root access. Sendmail WIZ comando habilitado, permite el acceso de root • http://seclists.org/fulldisclosure/2019/Jun/16 http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html http://www.cert.org/advisories/CA-1990-11.html http://www.cert.org/advisories/CA-1993-14.html http://www.openwall.com/lists/oss-security/2019/06/05/4 http://www.openwall.com/lists/oss-security/2019/06/06/1 http://www2.dataguard.no/bugtraq/1995_1/0332.html •

CVSS: 10.0EPSS: 7%CPEs: 1EXPL: 1

The debug command in Sendmail is enabled, allowing attackers to execute commands as root. El comando de depuración de Sendmail está activado, permitiendo a atacantes ejecutar comandos como root. • https://www.exploit-db.com/exploits/19028 http://seclists.org/fulldisclosure/2019/Jun/16 http://www.openwall.com/lists/oss-security/2019/06/05/4 http://www.openwall.com/lists/oss-security/2019/06/06/1 http://www.osvdb.org/195 http://www.securityfocus.com/bid/1 •