| 0 |
| url |
VCID-28we-h9bn-4ubd |
| vulnerability_id |
VCID-28we-h9bn-4ubd |
| summary |
A Improper Link Resolution Before File Access ('Link Following') vulnerability in a script called by the sendmail systemd service of openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: SUSE openSUSE Factory sendmail versions prior to 8.17.1-1.1. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-31256 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32187 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32303 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32205 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32173 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32207 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32341 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32166 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32215 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32242 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32243 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-31256 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-31256
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-28we-h9bn-4ubd |
|
| 1 |
| url |
VCID-3fjk-gqgc-3yhs |
| vulnerability_id |
VCID-3fjk-gqgc-3yhs |
| summary |
Sendmail is vulnerable to a race condition which could lead to the
execution of arbitrary code with sendmail privileges. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-0058 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.9821 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98213 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98217 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98218 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98223 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98226 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98225 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98231 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.5899 |
| scoring_system |
epss |
| scoring_elements |
0.98232 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-0058 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-0058
|
| risk_score |
1.0 |
| exploitability |
2.0 |
| weighted_severity |
0.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3fjk-gqgc-3yhs |
|
| 2 |
| url |
VCID-3k8z-tghq-cbdh |
| vulnerability_id |
VCID-3k8z-tghq-cbdh |
| summary |
sendmail: long first header can overflow into message body |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1490 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91926 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91934 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91942 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91948 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91961 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91966 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91969 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91965 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91984 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.07785 |
| scoring_system |
epss |
| scoring_elements |
0.91982 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1490 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-1490
|
| risk_score |
0.2 |
| exploitability |
2.0 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3k8z-tghq-cbdh |
|
| 3 |
| url |
VCID-6r2h-krab-7kfb |
| vulnerability_id |
VCID-6r2h-krab-7kfb |
| summary |
sendmail allows external mail with from address xxx@localhost.localdomain |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-7176 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72683 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72584 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72592 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72608 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72585 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72624 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72636 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72658 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.7264 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72631 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72673 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-7176 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-7176
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6r2h-krab-7kfb |
|
| 4 |
| url |
VCID-7f7m-pgk8-jqff |
| vulnerability_id |
VCID-7f7m-pgk8-jqff |
| summary |
Buffer overflow in Sendmail before 8.12.5, when configured to use a custom DNS map to query TXT records, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malicious DNS server. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-0906 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90208 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.9021 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90223 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90228 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90243 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.9025 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90258 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90257 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90252 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.05522 |
| scoring_system |
epss |
| scoring_elements |
0.90268 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-0906 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-0906
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7f7m-pgk8-jqff |
|
| 5 |
| url |
VCID-8g11-dp5v-yycj |
| vulnerability_id |
VCID-8g11-dp5v-yycj |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0688 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.8227 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82283 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82303 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82297 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82324 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82332 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82351 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82345 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82339 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01711 |
| scoring_system |
epss |
| scoring_elements |
0.82374 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0688 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0688
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8g11-dp5v-yycj |
|
| 6 |
| url |
VCID-8g7g-jc7b-f3fd |
| vulnerability_id |
VCID-8g7g-jc7b-f3fd |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1165 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81371 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81356 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81348 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81386 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81388 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.029 |
| scoring_system |
epss |
| scoring_elements |
0.86287 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.029 |
| scoring_system |
epss |
| scoring_elements |
0.86344 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.029 |
| scoring_system |
epss |
| scoring_elements |
0.86297 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.029 |
| scoring_system |
epss |
| scoring_elements |
0.86315 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.029 |
| scoring_system |
epss |
| scoring_elements |
0.86316 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.029 |
| scoring_system |
epss |
| scoring_elements |
0.86334 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1165 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-1165
|
| risk_score |
null |
| exploitability |
2.0 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8g7g-jc7b-f3fd |
|
| 7 |
| url |
VCID-8x67-725v-huh9 |
| vulnerability_id |
VCID-8x67-725v-huh9 |
| summary |
SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-1999-1580 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72238 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00708 |
| scoring_system |
epss |
| scoring_elements |
0.72229 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00778 |
| scoring_system |
epss |
| scoring_elements |
0.73597 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00778 |
| scoring_system |
epss |
| scoring_elements |
0.7362 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00778 |
| scoring_system |
epss |
| scoring_elements |
0.73593 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00778 |
| scoring_system |
epss |
| scoring_elements |
0.73629 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00778 |
| scoring_system |
epss |
| scoring_elements |
0.73665 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00778 |
| scoring_system |
epss |
| scoring_elements |
0.73647 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00778 |
| scoring_system |
epss |
| scoring_elements |
0.73638 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00778 |
| scoring_system |
epss |
| scoring_elements |
0.73642 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00778 |
| scoring_system |
epss |
| scoring_elements |
0.73587 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-1999-1580 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-1999-1580
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8x67-725v-huh9 |
|
| 8 |
| url |
VCID-9kez-3pxn-k7gr |
| vulnerability_id |
VCID-9kez-3pxn-k7gr |
| summary |
Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2004-0833 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71149 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71159 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71176 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71151 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71193 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71206 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71229 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71215 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71199 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71245 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00664 |
| scoring_system |
epss |
| scoring_elements |
0.71252 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2004-0833 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2004-0833
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9kez-3pxn-k7gr |
|
| 9 |
| url |
VCID-axw2-9wxf-skes |
| vulnerability_id |
VCID-axw2-9wxf-skes |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0694 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98911 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98913 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98915 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98917 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98918 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.9892 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98921 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98923 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.7608 |
| scoring_system |
epss |
| scoring_elements |
0.98925 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0694 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0694
|
| risk_score |
1.4 |
| exploitability |
2.0 |
| weighted_severity |
0.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-axw2-9wxf-skes |
|
| 10 |
| url |
VCID-dk9t-39dj-cud4 |
| vulnerability_id |
VCID-dk9t-39dj-cud4 |
| summary |
An error in the hostname matching in sendmail might enable remote
attackers to conduct man-in-the-middle attacks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4565 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73476 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73485 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73507 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73479 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73516 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73529 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73552 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73536 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73528 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73572 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00771 |
| scoring_system |
epss |
| scoring_elements |
0.73582 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4565 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-4565
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dk9t-39dj-cud4 |
|
| 11 |
| url |
VCID-fgbr-mydh-7bhx |
| vulnerability_id |
VCID-fgbr-mydh-7bhx |
| summary |
Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected." |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4434 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91437 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91443 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91453 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.9146 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91473 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91479 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91484 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91487 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91485 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91509 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.07028 |
| scoring_system |
epss |
| scoring_elements |
0.91504 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4434 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-4434
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fgbr-mydh-7bhx |
|
| 12 |
| url |
VCID-fm43-r24t-h7ez |
| vulnerability_id |
VCID-fm43-r24t-h7ez |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0161 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98574 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98577 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.9858 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98582 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98584 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98585 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98587 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98589 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98594 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.67899 |
| scoring_system |
epss |
| scoring_elements |
0.98595 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0161 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0161
|
| risk_score |
1.2 |
| exploitability |
2.0 |
| weighted_severity |
0.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fm43-r24t-h7ez |
|
| 13 |
| url |
VCID-gycy-hbda-p3ht |
| vulnerability_id |
VCID-gycy-hbda-p3ht |
| summary |
A vulnerability in sendmail could allow a local attacker to obtain
sensitive information. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3956 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2782 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2787 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27702 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2777 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27812 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27818 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27776 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27719 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27727 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27701 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3956 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3956
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gycy-hbda-p3ht |
|
| 14 |
| url |
VCID-m7np-crvq-p3dc |
| vulnerability_id |
VCID-m7np-crvq-p3dc |
| summary |
Faulty multipart MIME messages can cause forked Sendmail processes to
crash. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1173 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95674 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95683 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95689 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95691 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.957 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95704 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95707 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95709 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95718 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.21456 |
| scoring_system |
epss |
| scoring_elements |
0.95721 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1173 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-1173
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m7np-crvq-p3dc |
|
| 15 |
| url |
VCID-mngh-1224-uucj |
| vulnerability_id |
VCID-mngh-1224-uucj |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1337 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.98015 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.98003 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.98007 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.98008 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.98009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.97997 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.53948 |
| scoring_system |
epss |
| scoring_elements |
0.98002 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.56979 |
| scoring_system |
epss |
| scoring_elements |
0.98144 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.69706 |
| scoring_system |
epss |
| scoring_elements |
0.98651 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.69706 |
| scoring_system |
epss |
| scoring_elements |
0.98654 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.69706 |
| scoring_system |
epss |
| scoring_elements |
0.9865 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1337 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-1337
|
| risk_score |
1.2 |
| exploitability |
2.0 |
| weighted_severity |
0.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mngh-1224-uucj |
|
| 16 |
| url |
VCID-p9fa-ter1-3ker |
| vulnerability_id |
VCID-p9fa-ter1-3ker |
| summary |
The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which could allow local users to gain additional privileges via (1) expn, (2) checksendmail, or (3) doublebounce.pl. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0308 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19027 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19162 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19214 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1893 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1901 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19064 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19069 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19023 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18971 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18925 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18938 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0308 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0308
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p9fa-ter1-3ker |
|
| 17 |
| url |
VCID-pmae-5146-27dt |
| vulnerability_id |
VCID-pmae-5146-27dt |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0681 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93862 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93871 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.9388 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93883 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93892 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93896 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93899 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.939 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93921 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.12435 |
| scoring_system |
epss |
| scoring_elements |
0.93926 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0681 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0681
|
| risk_score |
0.2 |
| exploitability |
2.0 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pmae-5146-27dt |
|
| 18 |
| url |
VCID-qzm7-bmk8-9fgf |
| vulnerability_id |
VCID-qzm7-bmk8-9fgf |
| summary |
sendmail: SMTP smuggling vulnerability |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51765 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74609 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74636 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.7461 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74641 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74655 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74678 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74658 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.7465 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74687 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74695 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51765 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-51765
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qzm7-bmk8-9fgf |
|
| 19 |
| url |
VCID-rn5g-z7bd-6qbv |
| vulnerability_id |
VCID-rn5g-z7bd-6qbv |
| summary |
Sendmail 8.9.0 through 8.12.3 allows local users to cause a denial of service by obtaining an exclusive lock on the (1) alias, (2) map, (3) statistics, and (4) pid files. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1827 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00754 |
| scoring_system |
epss |
| scoring_elements |
0.7317 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00754 |
| scoring_system |
epss |
| scoring_elements |
0.7318 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00754 |
| scoring_system |
epss |
| scoring_elements |
0.73201 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00754 |
| scoring_system |
epss |
| scoring_elements |
0.73175 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00754 |
| scoring_system |
epss |
| scoring_elements |
0.73211 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00754 |
| scoring_system |
epss |
| scoring_elements |
0.73224 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00754 |
| scoring_system |
epss |
| scoring_elements |
0.73249 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00754 |
| scoring_system |
epss |
| scoring_elements |
0.7323 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00754 |
| scoring_system |
epss |
| scoring_elements |
0.73223 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00754 |
| scoring_system |
epss |
| scoring_elements |
0.73266 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00754 |
| scoring_system |
epss |
| scoring_elements |
0.73275 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-1827 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-1827
|
| risk_score |
null |
| exploitability |
2.0 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rn5g-z7bd-6qbv |
|
| 20 |
| url |
VCID-s44j-pgfp-zfbt |
| vulnerability_id |
VCID-s44j-pgfp-zfbt |
| summary |
Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact. NOTE: this might overlap CVE-1999-0129. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-1999-1592 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60358 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60187 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60264 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.6029 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60258 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60308 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60322 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60343 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.60329 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.6031 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00394 |
| scoring_system |
epss |
| scoring_elements |
0.6035 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-1999-1592 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-1999-1592
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s44j-pgfp-zfbt |
|
| 21 |
| url |
VCID-u8aq-2qhu-gff5 |
| vulnerability_id |
VCID-u8aq-2qhu-gff5 |
| summary |
ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3618 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69833 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69946 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69925 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.6991 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69896 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69937 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69845 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.6986 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69837 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69886 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69902 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3618 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3618
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u8aq-2qhu-gff5 |
|
| 22 |
| url |
VCID-v6wg-pqrr-z7dm |
| vulnerability_id |
VCID-v6wg-pqrr-z7dm |
| summary |
Sendmail allows SSLv2 during STARTTLS, and the CipherList config option isn't supported so you can't turn it off |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-7175 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47618 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.4751 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47539 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.4756 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47508 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47563 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47583 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47559 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47568 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00243 |
| scoring_system |
epss |
| scoring_elements |
0.47626 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-7175 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-7175
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v6wg-pqrr-z7dm |
|
| 23 |
| url |
VCID-y9e6-ugss-hbc8 |
| vulnerability_id |
VCID-y9e6-ugss-hbc8 |
| summary |
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2002-2261 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69337 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69349 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69365 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69345 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69395 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69411 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69433 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69418 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69404 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00598 |
| scoring_system |
epss |
| scoring_elements |
0.69454 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2002-2261 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2002-2261
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y9e6-ugss-hbc8 |
|