Page 5 of 23 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Sendmail before 8.6.7 allows local users to gain root access via a large value in the debug (-d) command line option. • http://www.cert.org/advisories/CA-94.12.sendmail.vulnerabilities http://www.dataguard.no/bugtraq/1994_1/0040.html http://www.dataguard.no/bugtraq/1994_1/0042.html http://www.dataguard.no/bugtraq/1994_1/0043.html http://www.dataguard.no/bugtraq/1994_1/0048.html http://www.dataguard.no/bugtraq/1994_1/0078.html https://exchange.xforce.ibmcloud.com/vulnerabilities/7155 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 1

SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html http://www.auscert.org.au/render.html?it=1853&cid=1978 http://www.cert.org/advisories/CA-95.11.sun.sendmail-oR.vul http://www.kb.cert.org/vuls/id/3278 http://www.securityfocus.com/bid/7829 •

CVSS: 10.0EPSS: 7%CPEs: 1EXPL: 1

The debug command in Sendmail is enabled, allowing attackers to execute commands as root. El comando de depuración de Sendmail está activado, permitiendo a atacantes ejecutar comandos como root. • https://www.exploit-db.com/exploits/19028 http://seclists.org/fulldisclosure/2019/Jun/16 http://www.openwall.com/lists/oss-security/2019/06/05/4 http://www.openwall.com/lists/oss-security/2019/06/06/1 http://www.osvdb.org/195 http://www.securityfocus.com/bid/1 •