CVE-2023-51765
- EPSS 0.84%
- Published 24.12.2023 06:15:07
- Last modified 21.11.2024 08:38:44
sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occu...
CVE-2021-3618
- EPSS 0.49%
- Published 23.03.2022 20:15:09
- Last modified 21.11.2024 06:21:59
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traf...
CVE-2014-3956
- EPSS 0.1%
- Published 04.06.2014 11:19:13
- Last modified 12.04.2025 10:46:40
The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom ma...
CVE-2009-4565
- EPSS 0.99%
- Published 04.01.2010 21:30:00
- Last modified 09.04.2025 00:30:58
sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a ...
- EPSS 7.79%
- Published 05.05.2009 19:30:00
- Last modified 09.04.2025 00:30:58
Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header.
CVE-2007-2246
- EPSS 2.5%
- Published 25.04.2007 16:19:00
- Last modified 09.04.2025 00:30:58
Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors. NOTE: due to the lack of ...
CVE-2006-7176
- EPSS 0.7%
- Published 27.03.2007 23:19:00
- Last modified 09.04.2025 00:30:58
The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the "localhost.localdomain" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages.
CVE-2006-7175
- EPSS 0.23%
- Published 27.03.2007 23:19:00
- Last modified 09.04.2025 00:30:58
The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired.
CVE-2006-4434
- EPSS 7.03%
- Published 29.08.2006 00:04:00
- Last modified 03.04.2025 01:03:51
Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the sev...
- EPSS 21.46%
- Published 07.06.2006 23:06:00
- Last modified 03.04.2025 01:03:51
Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Se...