Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/sendmail@8.13.4-3sarge3 |
| Type | deb |
| Namespace | debian |
| Name | sendmail |
| Version | 8.13.4-3sarge3 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 8.17.1.9-2+deb12u2 |
| Latest_non_vulnerable_version | 8.17.1.9-2+deb12u2 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-3fjk-gqgc-3yhs |
| vulnerability_id |
VCID-3fjk-gqgc-3yhs |
| summary |
Sendmail is vulnerable to a race condition which could lead to the
execution of arbitrary code with sendmail privileges. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-0058 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.9821 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98213 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98217 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98218 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98223 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98226 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98225 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98231 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98232 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-0058 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-0058
|
| risk_score |
1.0 |
| exploitability |
2.0 |
| weighted_severity |
0.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3fjk-gqgc-3yhs |
|
| 1 |
| url |
VCID-dk9t-39dj-cud4 |
| vulnerability_id |
VCID-dk9t-39dj-cud4 |
| summary |
An error in the hostname matching in sendmail might enable remote
attackers to conduct man-in-the-middle attacks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4565 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73476 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73485 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73507 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73479 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73516 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73529 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73552 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73536 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73528 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73572 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73582 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73575 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4565 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-4565
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dk9t-39dj-cud4 |
|
| 2 |
| url |
VCID-fgbr-mydh-7bhx |
| vulnerability_id |
VCID-fgbr-mydh-7bhx |
| summary |
Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected." |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4434 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91437 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91443 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91453 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.9146 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91473 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91479 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91484 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91487 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91485 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91509 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91504 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4434 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-4434
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fgbr-mydh-7bhx |
|
| 3 |
| url |
VCID-gycy-hbda-p3ht |
| vulnerability_id |
VCID-gycy-hbda-p3ht |
| summary |
A vulnerability in sendmail could allow a local attacker to obtain
sensitive information. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3956 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23676 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2787 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27702 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2777 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27812 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2782 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27776 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27719 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27727 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27701 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27818 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3956 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3956
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gycy-hbda-p3ht |
|
| 4 |
| url |
VCID-m7np-crvq-p3dc |
| vulnerability_id |
VCID-m7np-crvq-p3dc |
| summary |
Faulty multipart MIME messages can cause forked Sendmail processes to
crash. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1173 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95674 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95683 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95689 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95691 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.957 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95704 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95707 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95709 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95718 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95721 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95722 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1173 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-1173
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m7np-crvq-p3dc |
|
| 5 |
| url |
VCID-qzm7-bmk8-9fgf |
| vulnerability_id |
VCID-qzm7-bmk8-9fgf |
| summary |
sendmail: SMTP smuggling vulnerability |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51765 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74609 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74636 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.7461 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74641 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74655 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74678 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74658 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.7465 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74687 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74695 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74686 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51765 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-51765
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qzm7-bmk8-9fgf |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-3k8z-tghq-cbdh |
| vulnerability_id |
VCID-3k8z-tghq-cbdh |
| summary |
sendmail: long first header can overflow into message body |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1490 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91926 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91934 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91942 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91948 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91961 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91966 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91969 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91965 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91984 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91982 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91977 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1490 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-1490
|
| risk_score |
0.2 |
| exploitability |
2.0 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3k8z-tghq-cbdh |
|
| 1 |
| url |
VCID-7f7m-pgk8-jqff |
| vulnerability_id |
VCID-7f7m-pgk8-jqff |
| summary |
Buffer overflow in Sendmail before 8.12.5, when configured to use a custom DNS map to query TXT records, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malicious DNS server. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-0906 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90208 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.9021 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90223 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90228 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90243 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.9025 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90258 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90257 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90252 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90268 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90264 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-0906 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-0906
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7f7m-pgk8-jqff |
|
| 2 |
| url |
VCID-8g11-dp5v-yycj |
| vulnerability_id |
VCID-8g11-dp5v-yycj |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0688 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.8227 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82283 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82303 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82297 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82324 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82332 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82351 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82345 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82339 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82374 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82377 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0688 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0688
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8g11-dp5v-yycj |
|
| 3 |
| url |
VCID-9kez-3pxn-k7gr |
| vulnerability_id |
VCID-9kez-3pxn-k7gr |
| summary |
Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-0833 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71149 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71159 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71176 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71151 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71193 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71206 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71229 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71215 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71199 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71245 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71252 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-0833 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-0833
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9kez-3pxn-k7gr |
|
| 4 |
| url |
VCID-axw2-9wxf-skes |
| vulnerability_id |
VCID-axw2-9wxf-skes |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0694 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98911 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98913 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98915 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98917 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98918 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.9892 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98921 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98923 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98925 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98927 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0694 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0694
|
| risk_score |
1.4 |
| exploitability |
2.0 |
| weighted_severity |
0.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-axw2-9wxf-skes |
|
| 5 |
| url |
VCID-fm43-r24t-h7ez |
| vulnerability_id |
VCID-fm43-r24t-h7ez |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0161 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98574 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98577 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.9858 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98582 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98584 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98585 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98587 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98589 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98594 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98595 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98593 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0161 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0161
|
| risk_score |
1.2 |
| exploitability |
2.0 |
| weighted_severity |
0.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fm43-r24t-h7ez |
|
| 6 |
| url |
VCID-mngh-1224-uucj |
| vulnerability_id |
VCID-mngh-1224-uucj |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1337 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.51995 |
| scoring_system |
epss |
| scoring_elements |
0.97922 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.98007 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.98003 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.98008 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.98009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.98015 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.97997 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.98002 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.56979 |
| scoring_system |
epss |
| scoring_elements |
0.98144 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.69706 |
| scoring_system |
epss |
| scoring_elements |
0.98654 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.69706 |
| scoring_system |
epss |
| scoring_elements |
0.9865 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.69706 |
| scoring_system |
epss |
| scoring_elements |
0.98651 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1337 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-1337
|
| risk_score |
1.2 |
| exploitability |
2.0 |
| weighted_severity |
0.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mngh-1224-uucj |
|
| 7 |
| url |
VCID-p9fa-ter1-3ker |
| vulnerability_id |
VCID-p9fa-ter1-3ker |
| summary |
The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which could allow local users to gain additional privileges via (1) expn, (2) checksendmail, or (3) doublebounce.pl. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0308 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19027 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19162 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19214 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1893 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1901 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19064 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19023 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18971 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18925 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18938 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18948 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0308 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0308
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p9fa-ter1-3ker |
|
| 8 |
| url |
VCID-pmae-5146-27dt |
| vulnerability_id |
VCID-pmae-5146-27dt |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0681 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93862 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93871 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.9388 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93883 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93892 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93896 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93899 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.939 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93921 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93926 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93928 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0681 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0681
|
| risk_score |
0.2 |
| exploitability |
2.0 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pmae-5146-27dt |
|
| 9 |
| url |
VCID-y9e6-ugss-hbc8 |
| vulnerability_id |
VCID-y9e6-ugss-hbc8 |
| summary |
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-2261 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69337 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69349 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69365 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69345 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69395 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69411 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69433 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69418 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69404 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69454 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69435 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-2261 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-2261
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y9e6-ugss-hbc8 |
|
|
| Risk_score | 2.4 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.4-3sarge3 |