Page 3 of 33 results (0.002 seconds)

CVSS: 6.4EPSS: 0%CPEs: 7EXPL: 0

31 Dec 2002 — Sendmail 8.12.0 through 8.12.6 truncates log messages longer than 100 characters, which allows remote attackers to prevent the IP address from being logged via a long IDENT response. • http://archive.cert.uni-stuttgart.de/bugtraq/2002/09/msg00267.html • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 3%CPEs: 4EXPL: 0

04 Oct 2002 — Buffer overflow in Sendmail before 8.12.5, when configured to use a custom DNS map to query TXT records, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malicious DNS server. Desbordamiento de búfer en Sendmail anteriores a 8.12.5, cuando se configura para usar un mapa de DNS modificado para consultar registros TXT, permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante un servidor DNS malicioso. • http://www.iss.net/security_center/static/9443.php •

CVSS: 9.1EPSS: 2%CPEs: 12EXPL: 3

03 Oct 2002 — Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified. Sendmail Consortium's Restricted Shell (SMRSH) en Sendmail 8.12.6, 8.11.6-15 y anteriores, permite a atacantes puentear las restricciones pretendidas de smrsh insertando caractéres adicionale... • https://www.exploit-db.com/exploits/21884 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Oct 2001 — Sendmail before 8.12.1 does not properly drop privileges when the -C option is used to load custom configuration files, which allows local users to gain privileges via malformed arguments in the configuration file whose names contain characters with the high bit set, such as (1) macro names that are one character long, (2) a variable setting which is processed by the setoption function, or (3) a Modifiers setting which is processed by the getmodifiers function. • http://razor.bindview.com/publish/advisories/adv_sm812.html •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 0

12 Oct 2001 — Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to cause a denial of service (data loss) by (1) setting a high initial message hop count option (-h), which causes Sendmail to drop queue entries, (2) via the -qR option, or (3) via the -qS option. • ftp://patches.sgi.com/support/free/security/advisories/20011101-01-I •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

12 Oct 2001 — Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to obtain potentially sensitive information about the mail queue by setting debugging flags to enable debug mode. • ftp://patches.sgi.com/support/free/security/advisories/20011101-01-I •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 5

20 Sep 2001 — Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number. • https://www.exploit-db.com/exploits/21060 •

CVSS: 7.0EPSS: 0%CPEs: 8EXPL: 1

28 May 2001 — Sendmail before 8.11.4, and 8.12.0 before 8.12.0.Beta10, allows local users to cause a denial of service and possibly corrupt the heap and gain privileges via race conditions in signal handlers. • http://archives.neohapsis.com/archives/sendmail/2001-q2/0001.html •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

31 Dec 1999 — Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact. NOTE: this might overlap CVE-1999-0129. • http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1 •

CVSS: 7.5EPSS: 7%CPEs: 1EXPL: 1

22 Dec 1999 — Sendmail before 8.10.0 allows remote attackers to cause a denial of service by sending a series of ETRN commands then disconnecting from the server, while Sendmail continues to process the commands after the connection has been terminated. • https://www.exploit-db.com/exploits/19701 •