[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:62013
Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of SMTP commands, which could result in local privilege escalation or the execution of arbitrary code.

oval:org.secpod.oval:def:62034
opensmtpd: secure, reliable, lean, and easy-to configure SMTP server Several security issues were fixed in opensmtpd.

oval:org.secpod.oval:def:1801995
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce h ...

oval:org.secpod.oval:def:705399
opensmtpd: secure, reliable, lean, and easy-to configure SMTP server Several security issues were fixed in opensmtpd.

oval:org.secpod.oval:def:69958
Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of SMTP commands, which could result in local privilege escalation or the execution of arbitrary code.

oval:org.secpod.oval:def:604763
Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of SMTP commands, which could result in local privilege escalation or the execution of arbitrary code.

CPE    3
cpe:/o:debian:debian_linux:9.0
cpe:/a:opensmtpd:opensmtpd
cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~
CWE    1
CWE-125
*CVE
CVE-2020-8794

© SecPod Technologies