Page 5 of 47 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 1

16 Nov 1996 — Local users can start Sendmail in daemon mode and gain root privileges. • https://www.exploit-db.com/exploits/19556 •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

01 Oct 1996 — MIME buffer overflow in Sendmail 8.8.0 and 8.8.1 gives root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0206 •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

11 Sep 1996 — Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users. • http://www.securityfocus.com/bid/717 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

30 Aug 1996 — Sendmail before 8.6.7 allows local users to gain root access via a large value in the debug (-d) command line option. • http://www.cert.org/advisories/CA-94.12.sendmail.vulnerabilities •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 1

23 Aug 1995 — SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

17 Aug 1995 — In Sendmail, attackers can gain root privileges via SMTP by specifying an improper "mail from" address and an invalid "rcpt to" address that would cause the mail to bounce to a program. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0203 •

CVSS: 10.0EPSS: 11%CPEs: 1EXPL: 1

01 Oct 1988 — The debug command in Sendmail is enabled, allowing attackers to execute commands as root. El comando de depuración de Sendmail está activado, permitiendo a atacantes ejecutar comandos como root. • https://www.exploit-db.com/exploits/19028 •