Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/sendmail@8.13.4-3sarge3
Typedeb
Namespacedebian
Namesendmail
Version8.13.4-3sarge3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version8.17.1.9-2+deb12u2
Latest_non_vulnerable_version8.17.1.9-2+deb12u2
Affected_by_vulnerabilities
0
url VCID-3fjk-gqgc-3yhs
vulnerability_id VCID-3fjk-gqgc-3yhs
summary
Sendmail is vulnerable to a race condition which could lead to the
    execution of arbitrary code with sendmail privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0058.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0058.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0058
reference_id
reference_type
scores
0
value 0.5899
scoring_system epss
scoring_elements 0.9821
published_at 2026-04-01T12:55:00Z
1
value 0.5899
scoring_system epss
scoring_elements 0.98213
published_at 2026-04-02T12:55:00Z
2
value 0.5899
scoring_system epss
scoring_elements 0.98217
published_at 2026-04-04T12:55:00Z
3
value 0.5899
scoring_system epss
scoring_elements 0.98218
published_at 2026-04-07T12:55:00Z
4
value 0.5899
scoring_system epss
scoring_elements 0.98223
published_at 2026-04-09T12:55:00Z
5
value 0.5899
scoring_system epss
scoring_elements 0.98226
published_at 2026-04-13T12:55:00Z
6
value 0.5899
scoring_system epss
scoring_elements 0.98225
published_at 2026-04-12T12:55:00Z
7
value 0.5899
scoring_system epss
scoring_elements 0.98231
published_at 2026-04-21T12:55:00Z
8
value 0.5899
scoring_system epss
scoring_elements 0.98232
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0058
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617872
reference_id 1617872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617872
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358440
reference_id 358440
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358440
5
reference_url https://security.gentoo.org/glsa/200603-21
reference_id GLSA-200603-21
reference_type
scores
url https://security.gentoo.org/glsa/200603-21
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/2051.py
reference_id OSVDB-24037;CVE-2006-0058
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/2051.py
7
reference_url https://access.redhat.com/errata/RHSA-2006:0264
reference_id RHSA-2006:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0264
8
reference_url https://access.redhat.com/errata/RHSA-2006:0265
reference_id RHSA-2006:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0265
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.8-3
purl pkg:deb/debian/sendmail@8.13.8-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dk9t-39dj-cud4
1
vulnerability VCID-gycy-hbda-p3ht
2
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.8-3
aliases CVE-2006-0058
risk_score 1.0
exploitability 2.0
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3fjk-gqgc-3yhs
1
url VCID-dk9t-39dj-cud4
vulnerability_id VCID-dk9t-39dj-cud4
summary
An error in the hostname matching in sendmail might enable remote
    attackers to conduct man-in-the-middle attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4565.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-4565
reference_id
reference_type
scores
0
value 0.00771
scoring_system epss
scoring_elements 0.73476
published_at 2026-04-01T12:55:00Z
1
value 0.00771
scoring_system epss
scoring_elements 0.73485
published_at 2026-04-02T12:55:00Z
2
value 0.00771
scoring_system epss
scoring_elements 0.73507
published_at 2026-04-04T12:55:00Z
3
value 0.00771
scoring_system epss
scoring_elements 0.73479
published_at 2026-04-07T12:55:00Z
4
value 0.00771
scoring_system epss
scoring_elements 0.73516
published_at 2026-04-08T12:55:00Z
5
value 0.00771
scoring_system epss
scoring_elements 0.73529
published_at 2026-04-09T12:55:00Z
6
value 0.00771
scoring_system epss
scoring_elements 0.73552
published_at 2026-04-11T12:55:00Z
7
value 0.00771
scoring_system epss
scoring_elements 0.73536
published_at 2026-04-12T12:55:00Z
8
value 0.00771
scoring_system epss
scoring_elements 0.73528
published_at 2026-04-13T12:55:00Z
9
value 0.00771
scoring_system epss
scoring_elements 0.73572
published_at 2026-04-16T12:55:00Z
10
value 0.00771
scoring_system epss
scoring_elements 0.73582
published_at 2026-04-18T12:55:00Z
11
value 0.00771
scoring_system epss
scoring_elements 0.73575
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-4565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4565
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=552622
reference_id 552622
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=552622
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=564581
reference_id 564581
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=564581
5
reference_url https://security.gentoo.org/glsa/201206-30
reference_id GLSA-201206-30
reference_type
scores
url https://security.gentoo.org/glsa/201206-30
6
reference_url https://access.redhat.com/errata/RHSA-2010:0237
reference_id RHSA-2010:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0237
7
reference_url https://access.redhat.com/errata/RHSA-2011:0262
reference_id RHSA-2011:0262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0262
fixed_packages
0
url pkg:deb/debian/sendmail@8.14.3-9.4
purl pkg:deb/debian/sendmail@8.14.3-9.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gycy-hbda-p3ht
1
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.14.3-9.4
aliases CVE-2009-4565
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dk9t-39dj-cud4
2
url VCID-fgbr-mydh-7bhx
vulnerability_id VCID-fgbr-mydh-7bhx
summary Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4434.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4434
reference_id
reference_type
scores
0
value 0.07028
scoring_system epss
scoring_elements 0.91437
published_at 2026-04-01T12:55:00Z
1
value 0.07028
scoring_system epss
scoring_elements 0.91443
published_at 2026-04-02T12:55:00Z
2
value 0.07028
scoring_system epss
scoring_elements 0.91453
published_at 2026-04-04T12:55:00Z
3
value 0.07028
scoring_system epss
scoring_elements 0.9146
published_at 2026-04-07T12:55:00Z
4
value 0.07028
scoring_system epss
scoring_elements 0.91473
published_at 2026-04-08T12:55:00Z
5
value 0.07028
scoring_system epss
scoring_elements 0.91479
published_at 2026-04-09T12:55:00Z
6
value 0.07028
scoring_system epss
scoring_elements 0.91484
published_at 2026-04-11T12:55:00Z
7
value 0.07028
scoring_system epss
scoring_elements 0.91487
published_at 2026-04-12T12:55:00Z
8
value 0.07028
scoring_system epss
scoring_elements 0.91485
published_at 2026-04-13T12:55:00Z
9
value 0.07028
scoring_system epss
scoring_elements 0.91509
published_at 2026-04-16T12:55:00Z
10
value 0.07028
scoring_system epss
scoring_elements 0.91504
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4434
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=385054
reference_id 385054
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=385054
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.8-3
purl pkg:deb/debian/sendmail@8.13.8-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dk9t-39dj-cud4
1
vulnerability VCID-gycy-hbda-p3ht
2
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.8-3
aliases CVE-2006-4434
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fgbr-mydh-7bhx
3
url VCID-gycy-hbda-p3ht
vulnerability_id VCID-gycy-hbda-p3ht
summary
A vulnerability in sendmail could allow a local attacker to obtain
    sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3956.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3956.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3956
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23676
published_at 2026-04-21T12:55:00Z
1
value 0.001
scoring_system epss
scoring_elements 0.2787
published_at 2026-04-02T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.2791
published_at 2026-04-04T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27702
published_at 2026-04-07T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.2777
published_at 2026-04-08T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27812
published_at 2026-04-09T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.2782
published_at 2026-04-01T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.27776
published_at 2026-04-12T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.27719
published_at 2026-04-13T12:55:00Z
9
value 0.001
scoring_system epss
scoring_elements 0.27727
published_at 2026-04-16T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27701
published_at 2026-04-18T12:55:00Z
11
value 0.001
scoring_system epss
scoring_elements 0.27818
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3956
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1102174
reference_id 1102174
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1102174
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750562
reference_id 750562
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750562
5
reference_url https://security.gentoo.org/glsa/201412-32
reference_id GLSA-201412-32
reference_type
scores
url https://security.gentoo.org/glsa/201412-32
fixed_packages
0
url pkg:deb/debian/sendmail@8.14.4-8
purl pkg:deb/debian/sendmail@8.14.4-8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.14.4-8
aliases CVE-2014-3956
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gycy-hbda-p3ht
4
url VCID-m7np-crvq-p3dc
vulnerability_id VCID-m7np-crvq-p3dc
summary
Faulty multipart MIME messages can cause forked Sendmail processes to
    crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1173.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1173.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1173
reference_id
reference_type
scores
0
value 0.21456
scoring_system epss
scoring_elements 0.95674
published_at 2026-04-01T12:55:00Z
1
value 0.21456
scoring_system epss
scoring_elements 0.95683
published_at 2026-04-02T12:55:00Z
2
value 0.21456
scoring_system epss
scoring_elements 0.95689
published_at 2026-04-04T12:55:00Z
3
value 0.21456
scoring_system epss
scoring_elements 0.95691
published_at 2026-04-07T12:55:00Z
4
value 0.21456
scoring_system epss
scoring_elements 0.957
published_at 2026-04-08T12:55:00Z
5
value 0.21456
scoring_system epss
scoring_elements 0.95704
published_at 2026-04-09T12:55:00Z
6
value 0.21456
scoring_system epss
scoring_elements 0.95707
published_at 2026-04-12T12:55:00Z
7
value 0.21456
scoring_system epss
scoring_elements 0.95709
published_at 2026-04-13T12:55:00Z
8
value 0.21456
scoring_system epss
scoring_elements 0.95718
published_at 2026-04-16T12:55:00Z
9
value 0.21456
scoring_system epss
scoring_elements 0.95721
published_at 2026-04-18T12:55:00Z
10
value 0.21456
scoring_system epss
scoring_elements 0.95722
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1173
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618028
reference_id 1618028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618028
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373801
reference_id 373801
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373801
5
reference_url https://security.gentoo.org/glsa/200606-19
reference_id GLSA-200606-19
reference_type
scores
url https://security.gentoo.org/glsa/200606-19
6
reference_url https://access.redhat.com/errata/RHSA-2006:0515
reference_id RHSA-2006:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0515
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.8-3
purl pkg:deb/debian/sendmail@8.13.8-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dk9t-39dj-cud4
1
vulnerability VCID-gycy-hbda-p3ht
2
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.8-3
aliases CVE-2006-1173
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m7np-crvq-p3dc
5
url VCID-qzm7-bmk8-9fgf
vulnerability_id VCID-qzm7-bmk8-9fgf
summary sendmail: SMTP smuggling vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51765.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51765.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-51765
reference_id
reference_type
scores
0
value 0.00837
scoring_system epss
scoring_elements 0.74609
published_at 2026-04-02T12:55:00Z
1
value 0.00837
scoring_system epss
scoring_elements 0.74636
published_at 2026-04-04T12:55:00Z
2
value 0.00837
scoring_system epss
scoring_elements 0.7461
published_at 2026-04-07T12:55:00Z
3
value 0.00837
scoring_system epss
scoring_elements 0.74641
published_at 2026-04-08T12:55:00Z
4
value 0.00837
scoring_system epss
scoring_elements 0.74655
published_at 2026-04-09T12:55:00Z
5
value 0.00837
scoring_system epss
scoring_elements 0.74678
published_at 2026-04-11T12:55:00Z
6
value 0.00837
scoring_system epss
scoring_elements 0.74658
published_at 2026-04-12T12:55:00Z
7
value 0.00837
scoring_system epss
scoring_elements 0.7465
published_at 2026-04-13T12:55:00Z
8
value 0.00837
scoring_system epss
scoring_elements 0.74687
published_at 2026-04-16T12:55:00Z
9
value 0.00837
scoring_system epss
scoring_elements 0.74695
published_at 2026-04-18T12:55:00Z
10
value 0.00837
scoring_system epss
scoring_elements 0.74686
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-51765
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51765
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059386
reference_id 1059386
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059386
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255869
reference_id 2255869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255869
fixed_packages
0
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3
aliases CVE-2023-51765
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzm7-bmk8-9fgf
Fixing_vulnerabilities
0
url VCID-3k8z-tghq-cbdh
vulnerability_id VCID-3k8z-tghq-cbdh
summary sendmail: long first header can overflow into message body
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1490.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1490
reference_id
reference_type
scores
0
value 0.07785
scoring_system epss
scoring_elements 0.91926
published_at 2026-04-01T12:55:00Z
1
value 0.07785
scoring_system epss
scoring_elements 0.91934
published_at 2026-04-02T12:55:00Z
2
value 0.07785
scoring_system epss
scoring_elements 0.91942
published_at 2026-04-04T12:55:00Z
3
value 0.07785
scoring_system epss
scoring_elements 0.91948
published_at 2026-04-07T12:55:00Z
4
value 0.07785
scoring_system epss
scoring_elements 0.91961
published_at 2026-04-08T12:55:00Z
5
value 0.07785
scoring_system epss
scoring_elements 0.91966
published_at 2026-04-09T12:55:00Z
6
value 0.07785
scoring_system epss
scoring_elements 0.91969
published_at 2026-04-12T12:55:00Z
7
value 0.07785
scoring_system epss
scoring_elements 0.91965
published_at 2026-04-13T12:55:00Z
8
value 0.07785
scoring_system epss
scoring_elements 0.91984
published_at 2026-04-16T12:55:00Z
9
value 0.07785
scoring_system epss
scoring_elements 0.91982
published_at 2026-04-18T12:55:00Z
10
value 0.07785
scoring_system epss
scoring_elements 0.91977
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1490
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=499252
reference_id 499252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=499252
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32995.txt
reference_id CVE-2009-1490;OSVDB-54669
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32995.txt
5
reference_url https://www.securityfocus.com/bid/34944/info
reference_id CVE-2009-1490;OSVDB-54669
reference_type exploit
scores
url https://www.securityfocus.com/bid/34944/info
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.4-3sarge3
purl pkg:deb/debian/sendmail@8.13.4-3sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3fjk-gqgc-3yhs
1
vulnerability VCID-dk9t-39dj-cud4
2
vulnerability VCID-fgbr-mydh-7bhx
3
vulnerability VCID-gycy-hbda-p3ht
4
vulnerability VCID-m7np-crvq-p3dc
5
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.4-3sarge3
aliases CVE-2009-1490
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3k8z-tghq-cbdh
1
url VCID-7f7m-pgk8-jqff
vulnerability_id VCID-7f7m-pgk8-jqff
summary Buffer overflow in Sendmail before 8.12.5, when configured to use a custom DNS map to query TXT records, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malicious DNS server.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-0906
reference_id
reference_type
scores
0
value 0.05522
scoring_system epss
scoring_elements 0.90208
published_at 2026-04-01T12:55:00Z
1
value 0.05522
scoring_system epss
scoring_elements 0.9021
published_at 2026-04-02T12:55:00Z
2
value 0.05522
scoring_system epss
scoring_elements 0.90223
published_at 2026-04-04T12:55:00Z
3
value 0.05522
scoring_system epss
scoring_elements 0.90228
published_at 2026-04-07T12:55:00Z
4
value 0.05522
scoring_system epss
scoring_elements 0.90243
published_at 2026-04-08T12:55:00Z
5
value 0.05522
scoring_system epss
scoring_elements 0.9025
published_at 2026-04-09T12:55:00Z
6
value 0.05522
scoring_system epss
scoring_elements 0.90258
published_at 2026-04-11T12:55:00Z
7
value 0.05522
scoring_system epss
scoring_elements 0.90257
published_at 2026-04-12T12:55:00Z
8
value 0.05522
scoring_system epss
scoring_elements 0.90252
published_at 2026-04-13T12:55:00Z
9
value 0.05522
scoring_system epss
scoring_elements 0.90268
published_at 2026-04-18T12:55:00Z
10
value 0.05522
scoring_system epss
scoring_elements 0.90264
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-0906
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0906
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.4-3sarge3
purl pkg:deb/debian/sendmail@8.13.4-3sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3fjk-gqgc-3yhs
1
vulnerability VCID-dk9t-39dj-cud4
2
vulnerability VCID-fgbr-mydh-7bhx
3
vulnerability VCID-gycy-hbda-p3ht
4
vulnerability VCID-m7np-crvq-p3dc
5
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.4-3sarge3
aliases CVE-2002-0906
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7f7m-pgk8-jqff
2
url VCID-8g11-dp5v-yycj
vulnerability_id VCID-8g11-dp5v-yycj
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0688.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0688.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0688
reference_id
reference_type
scores
0
value 0.01711
scoring_system epss
scoring_elements 0.8227
published_at 2026-04-01T12:55:00Z
1
value 0.01711
scoring_system epss
scoring_elements 0.82283
published_at 2026-04-02T12:55:00Z
2
value 0.01711
scoring_system epss
scoring_elements 0.82303
published_at 2026-04-04T12:55:00Z
3
value 0.01711
scoring_system epss
scoring_elements 0.82297
published_at 2026-04-07T12:55:00Z
4
value 0.01711
scoring_system epss
scoring_elements 0.82324
published_at 2026-04-08T12:55:00Z
5
value 0.01711
scoring_system epss
scoring_elements 0.82332
published_at 2026-04-09T12:55:00Z
6
value 0.01711
scoring_system epss
scoring_elements 0.82351
published_at 2026-04-11T12:55:00Z
7
value 0.01711
scoring_system epss
scoring_elements 0.82345
published_at 2026-04-12T12:55:00Z
8
value 0.01711
scoring_system epss
scoring_elements 0.82339
published_at 2026-04-13T12:55:00Z
9
value 0.01711
scoring_system epss
scoring_elements 0.82374
published_at 2026-04-18T12:55:00Z
10
value 0.01711
scoring_system epss
scoring_elements 0.82377
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0688
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0688
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617065
reference_id 1617065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617065
4
reference_url https://access.redhat.com/errata/RHSA-2003:265
reference_id RHSA-2003:265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:265
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.4-3sarge3
purl pkg:deb/debian/sendmail@8.13.4-3sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3fjk-gqgc-3yhs
1
vulnerability VCID-dk9t-39dj-cud4
2
vulnerability VCID-fgbr-mydh-7bhx
3
vulnerability VCID-gycy-hbda-p3ht
4
vulnerability VCID-m7np-crvq-p3dc
5
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.4-3sarge3
aliases CVE-2003-0688
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8g11-dp5v-yycj
3
url VCID-9kez-3pxn-k7gr
vulnerability_id VCID-9kez-3pxn-k7gr
summary Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0833
reference_id
reference_type
scores
0
value 0.00664
scoring_system epss
scoring_elements 0.71149
published_at 2026-04-01T12:55:00Z
1
value 0.00664
scoring_system epss
scoring_elements 0.71159
published_at 2026-04-02T12:55:00Z
2
value 0.00664
scoring_system epss
scoring_elements 0.71176
published_at 2026-04-04T12:55:00Z
3
value 0.00664
scoring_system epss
scoring_elements 0.71151
published_at 2026-04-07T12:55:00Z
4
value 0.00664
scoring_system epss
scoring_elements 0.71193
published_at 2026-04-08T12:55:00Z
5
value 0.00664
scoring_system epss
scoring_elements 0.71206
published_at 2026-04-09T12:55:00Z
6
value 0.00664
scoring_system epss
scoring_elements 0.71229
published_at 2026-04-21T12:55:00Z
7
value 0.00664
scoring_system epss
scoring_elements 0.71215
published_at 2026-04-12T12:55:00Z
8
value 0.00664
scoring_system epss
scoring_elements 0.71199
published_at 2026-04-13T12:55:00Z
9
value 0.00664
scoring_system epss
scoring_elements 0.71245
published_at 2026-04-16T12:55:00Z
10
value 0.00664
scoring_system epss
scoring_elements 0.71252
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0833
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0833
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.4-3sarge3
purl pkg:deb/debian/sendmail@8.13.4-3sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3fjk-gqgc-3yhs
1
vulnerability VCID-dk9t-39dj-cud4
2
vulnerability VCID-fgbr-mydh-7bhx
3
vulnerability VCID-gycy-hbda-p3ht
4
vulnerability VCID-m7np-crvq-p3dc
5
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.4-3sarge3
aliases CVE-2004-0833
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9kez-3pxn-k7gr
4
url VCID-axw2-9wxf-skes
vulnerability_id VCID-axw2-9wxf-skes
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0694.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0694
reference_id
reference_type
scores
0
value 0.7608
scoring_system epss
scoring_elements 0.98911
published_at 2026-04-01T12:55:00Z
1
value 0.7608
scoring_system epss
scoring_elements 0.98913
published_at 2026-04-02T12:55:00Z
2
value 0.7608
scoring_system epss
scoring_elements 0.98915
published_at 2026-04-04T12:55:00Z
3
value 0.7608
scoring_system epss
scoring_elements 0.98917
published_at 2026-04-07T12:55:00Z
4
value 0.7608
scoring_system epss
scoring_elements 0.98918
published_at 2026-04-09T12:55:00Z
5
value 0.7608
scoring_system epss
scoring_elements 0.9892
published_at 2026-04-12T12:55:00Z
6
value 0.7608
scoring_system epss
scoring_elements 0.98921
published_at 2026-04-13T12:55:00Z
7
value 0.7608
scoring_system epss
scoring_elements 0.98923
published_at 2026-04-16T12:55:00Z
8
value 0.7608
scoring_system epss
scoring_elements 0.98925
published_at 2026-04-18T12:55:00Z
9
value 0.7608
scoring_system epss
scoring_elements 0.98927
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0694
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617070
reference_id 1617070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617070
4
reference_url https://access.redhat.com/errata/RHSA-2003:283
reference_id RHSA-2003:283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:283
5
reference_url https://access.redhat.com/errata/RHSA-2003:284
reference_id RHSA-2003:284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:284
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.4-3sarge3
purl pkg:deb/debian/sendmail@8.13.4-3sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3fjk-gqgc-3yhs
1
vulnerability VCID-dk9t-39dj-cud4
2
vulnerability VCID-fgbr-mydh-7bhx
3
vulnerability VCID-gycy-hbda-p3ht
4
vulnerability VCID-m7np-crvq-p3dc
5
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.4-3sarge3
aliases CVE-2003-0694
risk_score 1.4
exploitability 2.0
weighted_severity 0.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-axw2-9wxf-skes
5
url VCID-fm43-r24t-h7ez
vulnerability_id VCID-fm43-r24t-h7ez
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0161.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0161
reference_id
reference_type
scores
0
value 0.67899
scoring_system epss
scoring_elements 0.98574
published_at 2026-04-01T12:55:00Z
1
value 0.67899
scoring_system epss
scoring_elements 0.98577
published_at 2026-04-02T12:55:00Z
2
value 0.67899
scoring_system epss
scoring_elements 0.9858
published_at 2026-04-04T12:55:00Z
3
value 0.67899
scoring_system epss
scoring_elements 0.98582
published_at 2026-04-07T12:55:00Z
4
value 0.67899
scoring_system epss
scoring_elements 0.98584
published_at 2026-04-08T12:55:00Z
5
value 0.67899
scoring_system epss
scoring_elements 0.98585
published_at 2026-04-09T12:55:00Z
6
value 0.67899
scoring_system epss
scoring_elements 0.98587
published_at 2026-04-12T12:55:00Z
7
value 0.67899
scoring_system epss
scoring_elements 0.98589
published_at 2026-04-13T12:55:00Z
8
value 0.67899
scoring_system epss
scoring_elements 0.98594
published_at 2026-04-16T12:55:00Z
9
value 0.67899
scoring_system epss
scoring_elements 0.98595
published_at 2026-04-18T12:55:00Z
10
value 0.67899
scoring_system epss
scoring_elements 0.98593
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0161
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0161
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616990
reference_id 1616990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616990
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/22442.c
reference_id CVE-2003-0161;OSVDB-8294
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/22442.c
5
reference_url https://www.securityfocus.com/bid/7230/info
reference_id CVE-2003-0161;OSVDB-8294
reference_type exploit
scores
url https://www.securityfocus.com/bid/7230/info
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24.c
reference_id OSVDB-8294;CVE-2003-0161
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24.c
7
reference_url https://access.redhat.com/errata/RHSA-2003:120
reference_id RHSA-2003:120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:120
8
reference_url https://access.redhat.com/errata/RHSA-2003:121
reference_id RHSA-2003:121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:121
9
reference_url https://access.redhat.com/errata/RHSA-2003:227
reference_id RHSA-2003:227
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:227
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.4-3sarge3
purl pkg:deb/debian/sendmail@8.13.4-3sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3fjk-gqgc-3yhs
1
vulnerability VCID-dk9t-39dj-cud4
2
vulnerability VCID-fgbr-mydh-7bhx
3
vulnerability VCID-gycy-hbda-p3ht
4
vulnerability VCID-m7np-crvq-p3dc
5
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.4-3sarge3
aliases CVE-2003-0161
risk_score 1.2
exploitability 2.0
weighted_severity 0.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fm43-r24t-h7ez
6
url VCID-mngh-1224-uucj
vulnerability_id VCID-mngh-1224-uucj
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1337.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1337.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1337
reference_id
reference_type
scores
0
value 0.51995
scoring_system epss
scoring_elements 0.97922
published_at 2026-04-21T12:55:00Z
1
value 0.53948
scoring_system epss
scoring_elements 0.98007
published_at 2026-04-11T12:55:00Z
2
value 0.53948
scoring_system epss
scoring_elements 0.98003
published_at 2026-04-09T12:55:00Z
3
value 0.53948
scoring_system epss
scoring_elements 0.98008
published_at 2026-04-12T12:55:00Z
4
value 0.53948
scoring_system epss
scoring_elements 0.98009
published_at 2026-04-13T12:55:00Z
5
value 0.53948
scoring_system epss
scoring_elements 0.98015
published_at 2026-04-18T12:55:00Z
6
value 0.53948
scoring_system epss
scoring_elements 0.97997
published_at 2026-04-07T12:55:00Z
7
value 0.53948
scoring_system epss
scoring_elements 0.98002
published_at 2026-04-08T12:55:00Z
8
value 0.56979
scoring_system epss
scoring_elements 0.98144
published_at 2026-04-16T12:55:00Z
9
value 0.69706
scoring_system epss
scoring_elements 0.98654
published_at 2026-04-04T12:55:00Z
10
value 0.69706
scoring_system epss
scoring_elements 0.9865
published_at 2026-04-01T12:55:00Z
11
value 0.69706
scoring_system epss
scoring_elements 0.98651
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1337
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1337
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1337
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616877
reference_id 1616877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616877
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22313.c
reference_id CVE-2002-1337;OSVDB-4502
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22313.c
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22314.c
reference_id CVE-2002-1337;OSVDB-4502
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22314.c
6
reference_url https://www.securityfocus.com/bid/6991/info
reference_id CVE-2002-1337;OSVDB-4502
reference_type exploit
scores
url https://www.securityfocus.com/bid/6991/info
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/411.c
reference_id OSVDB-4502;CVE-2002-1337
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/411.c
8
reference_url https://access.redhat.com/errata/RHSA-2003:073
reference_id RHSA-2003:073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:073
9
reference_url https://access.redhat.com/errata/RHSA-2003:074
reference_id RHSA-2003:074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:074
10
reference_url https://access.redhat.com/errata/RHSA-2003:227
reference_id RHSA-2003:227
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:227
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.4-3sarge3
purl pkg:deb/debian/sendmail@8.13.4-3sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3fjk-gqgc-3yhs
1
vulnerability VCID-dk9t-39dj-cud4
2
vulnerability VCID-fgbr-mydh-7bhx
3
vulnerability VCID-gycy-hbda-p3ht
4
vulnerability VCID-m7np-crvq-p3dc
5
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.4-3sarge3
aliases CVE-2002-1337
risk_score 1.2
exploitability 2.0
weighted_severity 0.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mngh-1224-uucj
7
url VCID-p9fa-ter1-3ker
vulnerability_id VCID-p9fa-ter1-3ker
summary The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which could allow local users to gain additional privileges via (1) expn, (2) checksendmail, or (3) doublebounce.pl.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0308
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19027
published_at 2026-04-01T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19162
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19214
published_at 2026-04-04T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.1893
published_at 2026-04-07T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.1901
published_at 2026-04-08T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19064
published_at 2026-04-09T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19069
published_at 2026-04-11T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19023
published_at 2026-04-12T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18971
published_at 2026-04-13T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.18925
published_at 2026-04-16T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.18938
published_at 2026-04-18T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.18948
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0308
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0308
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.4-3sarge3
purl pkg:deb/debian/sendmail@8.13.4-3sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3fjk-gqgc-3yhs
1
vulnerability VCID-dk9t-39dj-cud4
2
vulnerability VCID-fgbr-mydh-7bhx
3
vulnerability VCID-gycy-hbda-p3ht
4
vulnerability VCID-m7np-crvq-p3dc
5
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.4-3sarge3
aliases CVE-2003-0308
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9fa-ter1-3ker
8
url VCID-pmae-5146-27dt
vulnerability_id VCID-pmae-5146-27dt
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0681.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0681.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0681
reference_id
reference_type
scores
0
value 0.12435
scoring_system epss
scoring_elements 0.93862
published_at 2026-04-01T12:55:00Z
1
value 0.12435
scoring_system epss
scoring_elements 0.93871
published_at 2026-04-02T12:55:00Z
2
value 0.12435
scoring_system epss
scoring_elements 0.9388
published_at 2026-04-04T12:55:00Z
3
value 0.12435
scoring_system epss
scoring_elements 0.93883
published_at 2026-04-07T12:55:00Z
4
value 0.12435
scoring_system epss
scoring_elements 0.93892
published_at 2026-04-08T12:55:00Z
5
value 0.12435
scoring_system epss
scoring_elements 0.93896
published_at 2026-04-09T12:55:00Z
6
value 0.12435
scoring_system epss
scoring_elements 0.93899
published_at 2026-04-13T12:55:00Z
7
value 0.12435
scoring_system epss
scoring_elements 0.939
published_at 2026-04-12T12:55:00Z
8
value 0.12435
scoring_system epss
scoring_elements 0.93921
published_at 2026-04-16T12:55:00Z
9
value 0.12435
scoring_system epss
scoring_elements 0.93926
published_at 2026-04-18T12:55:00Z
10
value 0.12435
scoring_system epss
scoring_elements 0.93928
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0681
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0681
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617062
reference_id 1617062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617062
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/23154.c
reference_id CVE-2003-0681;OSVDB-2577
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/23154.c
5
reference_url https://www.securityfocus.com/bid/8641/info
reference_id CVE-2003-0681;OSVDB-2577
reference_type exploit
scores
url https://www.securityfocus.com/bid/8641/info
6
reference_url https://access.redhat.com/errata/RHSA-2003:283
reference_id RHSA-2003:283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:283
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.4-3sarge3
purl pkg:deb/debian/sendmail@8.13.4-3sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3fjk-gqgc-3yhs
1
vulnerability VCID-dk9t-39dj-cud4
2
vulnerability VCID-fgbr-mydh-7bhx
3
vulnerability VCID-gycy-hbda-p3ht
4
vulnerability VCID-m7np-crvq-p3dc
5
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.4-3sarge3
aliases CVE-2003-0681
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmae-5146-27dt
9
url VCID-y9e6-ugss-hbc8
vulnerability_id VCID-y9e6-ugss-hbc8
summary Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-2261
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69337
published_at 2026-04-01T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69349
published_at 2026-04-02T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69365
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69345
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69395
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69411
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69433
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69418
published_at 2026-04-12T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69404
published_at 2026-04-13T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69443
published_at 2026-04-16T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69454
published_at 2026-04-18T12:55:00Z
11
value 0.00598
scoring_system epss
scoring_elements 0.69435
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-2261
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2261
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.4-3sarge3
purl pkg:deb/debian/sendmail@8.13.4-3sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3fjk-gqgc-3yhs
1
vulnerability VCID-dk9t-39dj-cud4
2
vulnerability VCID-fgbr-mydh-7bhx
3
vulnerability VCID-gycy-hbda-p3ht
4
vulnerability VCID-m7np-crvq-p3dc
5
vulnerability VCID-qzm7-bmk8-9fgf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.4-3sarge3
aliases CVE-2002-2261
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9e6-ugss-hbc8
Risk_score2.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.4-3sarge3