Page 9 of 47 results (0.010 seconds)

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 1

Local users can start Sendmail in daemon mode and gain root privileges. • https://www.exploit-db.com/exploits/19556 http://www.securityfocus.com/bid/716 •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

MIME buffer overflow in Sendmail 8.8.0 and 8.8.1 gives root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0206 •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users. • http://www.securityfocus.com/bid/717 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Sendmail before 8.6.7 allows local users to gain root access via a large value in the debug (-d) command line option. • http://www.cert.org/advisories/CA-94.12.sendmail.vulnerabilities http://www.dataguard.no/bugtraq/1994_1/0040.html http://www.dataguard.no/bugtraq/1994_1/0042.html http://www.dataguard.no/bugtraq/1994_1/0043.html http://www.dataguard.no/bugtraq/1994_1/0048.html http://www.dataguard.no/bugtraq/1994_1/0078.html https://exchange.xforce.ibmcloud.com/vulnerabilities/7155 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 1

SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html http://www.auscert.org.au/render.html?it=1853&cid=1978 http://www.cert.org/advisories/CA-95.11.sun.sendmail-oR.vul http://www.kb.cert.org/vuls/id/3278 http://www.securityfocus.com/bid/7829 •