Page 4 of 47 results (0.008 seconds)

CVSS: 7.5EPSS: 7%CPEs: 1EXPL: 1

22 Dec 1999 — Sendmail before 8.10.0 allows remote attackers to cause a denial of service by sending a series of ETRN commands then disconnecting from the server, while Sendmail continues to process the commands after the connection has been terminated. • https://www.exploit-db.com/exploits/19701 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

07 Dec 1999 — Sendmail allows local users to reinitialize the aliases database via the newaliases command, then cause a denial of service by interrupting Sendmail. • http://www.securityfocus.com/bid/857 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

19 Apr 1999 — Denial of service in Sendmail 8.8.6 in HPUX. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0684 •

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 0

04 Feb 1999 — The metamail package allows remote command execution using shell metacharacters that are not quoted in a mailcap entry. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0365 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

01 Jan 1999 — Denial of service in Sendmail 8.6.11 and 8.6.12. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0205 •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 1

01 Jan 1999 — Remote attackers can cause a denial of service in Sendmail 8.8.x and 8.9.2 by sending messages with a large number of headers. • https://www.exploit-db.com/exploits/23167 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

01 Dec 1998 — Denial of service in HP-UX sendmail 8.8.6 related to accepting connections. • http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9904-097 •

CVSS: 10.0EPSS: 2%CPEs: 4EXPL: 0

28 Jan 1997 — MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4. • http://www.securityfocus.com/bid/685 •

CVSS: 10.0EPSS: 6%CPEs: 1EXPL: 1

01 Jan 1997 — Sendmail 8.6.9 allows remote attackers to execute root commands, using ident. • https://www.exploit-db.com/exploits/20599 •

CVSS: 7.8EPSS: 0%CPEs: 29EXPL: 0

03 Dec 1996 — Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file. • http://www.cert.org/advisories/CA-1996-25.html •