[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:61494
Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of email addresses which could result in the execution of arbitrary commands as root. In addition this update fixes a denial of service by triggering an opportunistic TLS downgrade.

oval:org.secpod.oval:def:62025
opensmtpd: secure, reliable, lean, and easy-to configure SMTP server OpenSMTPD could be made to run programs as root if it received specially crafted input over the network.

oval:org.secpod.oval:def:69943
Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of email addresses which could result in the execution of arbitrary commands as root. In addition this update fixes a denial of service by triggering an opportunistic TLS downgrade.

oval:org.secpod.oval:def:604710
Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of email addresses which could result in the execution of arbitrary commands as root. In addition this update fixes a denial of service by triggering an opportunistic TLS downgrade.

oval:org.secpod.oval:def:705371
opensmtpd: secure, reliable, lean, and easy-to configure SMTP server OpenSMTPD could be made to run programs as root if it received specially crafted input over the network.

CPE    2
cpe:/o:debian:debian_linux:9.0
cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~
CWE    1
CWE-78
*CVE
CVE-2020-7247

© SecPod Technologies