Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
Typedeb
Namespacedebian
Namesendmail
Version8.17.1.9-2+deb12u2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.18.1-1
Latest_non_vulnerable_version8.18.2-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-28we-h9bn-4ubd
vulnerability_id VCID-28we-h9bn-4ubd
summary A Improper Link Resolution Before File Access ('Link Following') vulnerability in a script called by the sendmail systemd service of openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: SUSE openSUSE Factory sendmail versions prior to 8.17.1-1.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31256
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32187
published_at 2026-04-18T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32303
published_at 2026-04-02T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32205
published_at 2026-04-12T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32173
published_at 2026-04-13T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32207
published_at 2026-04-16T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32341
published_at 2026-04-04T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32166
published_at 2026-04-07T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32215
published_at 2026-04-08T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32242
published_at 2026-04-09T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32243
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31256
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1204696
reference_id show_bug.cgi?id=1204696
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-09T19:11:41Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1204696
fixed_packages
0
url pkg:deb/debian/sendmail@0?distro=trixie
purl pkg:deb/debian/sendmail@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@0%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2022-31256
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28we-h9bn-4ubd
1
url VCID-3fjk-gqgc-3yhs
vulnerability_id VCID-3fjk-gqgc-3yhs
summary
Sendmail is vulnerable to a race condition which could lead to the
    execution of arbitrary code with sendmail privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0058.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0058.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0058
reference_id
reference_type
scores
0
value 0.5899
scoring_system epss
scoring_elements 0.9821
published_at 2026-04-01T12:55:00Z
1
value 0.5899
scoring_system epss
scoring_elements 0.98213
published_at 2026-04-02T12:55:00Z
2
value 0.5899
scoring_system epss
scoring_elements 0.98217
published_at 2026-04-04T12:55:00Z
3
value 0.5899
scoring_system epss
scoring_elements 0.98218
published_at 2026-04-07T12:55:00Z
4
value 0.5899
scoring_system epss
scoring_elements 0.98223
published_at 2026-04-09T12:55:00Z
5
value 0.5899
scoring_system epss
scoring_elements 0.98226
published_at 2026-04-13T12:55:00Z
6
value 0.5899
scoring_system epss
scoring_elements 0.98225
published_at 2026-04-12T12:55:00Z
7
value 0.5899
scoring_system epss
scoring_elements 0.98231
published_at 2026-04-16T12:55:00Z
8
value 0.5899
scoring_system epss
scoring_elements 0.98232
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0058
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617872
reference_id 1617872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617872
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358440
reference_id 358440
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358440
5
reference_url https://security.gentoo.org/glsa/200603-21
reference_id GLSA-200603-21
reference_type
scores
url https://security.gentoo.org/glsa/200603-21
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/2051.py
reference_id OSVDB-24037;CVE-2006-0058
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/2051.py
7
reference_url https://access.redhat.com/errata/RHSA-2006:0264
reference_id RHSA-2006:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0264
8
reference_url https://access.redhat.com/errata/RHSA-2006:0265
reference_id RHSA-2006:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0265
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.6-1?distro=trixie
purl pkg:deb/debian/sendmail@8.13.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.6-1%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2006-0058
risk_score 1.0
exploitability 2.0
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3fjk-gqgc-3yhs
2
url VCID-3k8z-tghq-cbdh
vulnerability_id VCID-3k8z-tghq-cbdh
summary sendmail: long first header can overflow into message body
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1490.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1490
reference_id
reference_type
scores
0
value 0.07785
scoring_system epss
scoring_elements 0.91926
published_at 2026-04-01T12:55:00Z
1
value 0.07785
scoring_system epss
scoring_elements 0.91934
published_at 2026-04-02T12:55:00Z
2
value 0.07785
scoring_system epss
scoring_elements 0.91942
published_at 2026-04-04T12:55:00Z
3
value 0.07785
scoring_system epss
scoring_elements 0.91948
published_at 2026-04-07T12:55:00Z
4
value 0.07785
scoring_system epss
scoring_elements 0.91961
published_at 2026-04-08T12:55:00Z
5
value 0.07785
scoring_system epss
scoring_elements 0.91966
published_at 2026-04-09T12:55:00Z
6
value 0.07785
scoring_system epss
scoring_elements 0.91969
published_at 2026-04-12T12:55:00Z
7
value 0.07785
scoring_system epss
scoring_elements 0.91965
published_at 2026-04-13T12:55:00Z
8
value 0.07785
scoring_system epss
scoring_elements 0.91984
published_at 2026-04-16T12:55:00Z
9
value 0.07785
scoring_system epss
scoring_elements 0.91982
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1490
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=499252
reference_id 499252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=499252
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32995.txt
reference_id CVE-2009-1490;OSVDB-54669
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32995.txt
5
reference_url https://www.securityfocus.com/bid/34944/info
reference_id CVE-2009-1490;OSVDB-54669
reference_type exploit
scores
url https://www.securityfocus.com/bid/34944/info
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.2?distro=trixie
purl pkg:deb/debian/sendmail@8.13.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.2%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2009-1490
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3k8z-tghq-cbdh
3
url VCID-6r2h-krab-7kfb
vulnerability_id VCID-6r2h-krab-7kfb
summary sendmail allows external mail with from address xxx@localhost.localdomain
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7176.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-7176
reference_id
reference_type
scores
0
value 0.00729
scoring_system epss
scoring_elements 0.72683
published_at 2026-04-18T12:55:00Z
1
value 0.00729
scoring_system epss
scoring_elements 0.72584
published_at 2026-04-01T12:55:00Z
2
value 0.00729
scoring_system epss
scoring_elements 0.72592
published_at 2026-04-02T12:55:00Z
3
value 0.00729
scoring_system epss
scoring_elements 0.72608
published_at 2026-04-04T12:55:00Z
4
value 0.00729
scoring_system epss
scoring_elements 0.72585
published_at 2026-04-07T12:55:00Z
5
value 0.00729
scoring_system epss
scoring_elements 0.72624
published_at 2026-04-08T12:55:00Z
6
value 0.00729
scoring_system epss
scoring_elements 0.72636
published_at 2026-04-09T12:55:00Z
7
value 0.00729
scoring_system epss
scoring_elements 0.72658
published_at 2026-04-11T12:55:00Z
8
value 0.00729
scoring_system epss
scoring_elements 0.7264
published_at 2026-04-12T12:55:00Z
9
value 0.00729
scoring_system epss
scoring_elements 0.72631
published_at 2026-04-13T12:55:00Z
10
value 0.00729
scoring_system epss
scoring_elements 0.72673
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-7176
2
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838
3
reference_url http://secunia.com/advisories/25098
reference_id
reference_type
scores
url http://secunia.com/advisories/25098
4
reference_url http://secunia.com/advisories/25743
reference_id
reference_type
scores
url http://secunia.com/advisories/25743
5
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499
6
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm
7
reference_url http://www.redhat.com/support/errata/RHSA-2007-0252.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0252.html
8
reference_url http://www.securityfocus.com/bid/23742
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23742
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=238540
reference_id 238540
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=238540
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:update4:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:update4:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-7176
reference_id CVE-2006-7176
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2006-7176
13
reference_url https://access.redhat.com/errata/RHSA-2007:0252
reference_id RHSA-2007:0252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0252
14
reference_url https://access.redhat.com/errata/RHSA-2010:0237
reference_id RHSA-2010:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0237
fixed_packages
0
url pkg:deb/debian/sendmail@0?distro=trixie
purl pkg:deb/debian/sendmail@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@0%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2006-7176
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6r2h-krab-7kfb
4
url VCID-7f7m-pgk8-jqff
vulnerability_id VCID-7f7m-pgk8-jqff
summary Buffer overflow in Sendmail before 8.12.5, when configured to use a custom DNS map to query TXT records, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malicious DNS server.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-0906
reference_id
reference_type
scores
0
value 0.05522
scoring_system epss
scoring_elements 0.90208
published_at 2026-04-01T12:55:00Z
1
value 0.05522
scoring_system epss
scoring_elements 0.9021
published_at 2026-04-02T12:55:00Z
2
value 0.05522
scoring_system epss
scoring_elements 0.90223
published_at 2026-04-04T12:55:00Z
3
value 0.05522
scoring_system epss
scoring_elements 0.90228
published_at 2026-04-07T12:55:00Z
4
value 0.05522
scoring_system epss
scoring_elements 0.90243
published_at 2026-04-08T12:55:00Z
5
value 0.05522
scoring_system epss
scoring_elements 0.9025
published_at 2026-04-09T12:55:00Z
6
value 0.05522
scoring_system epss
scoring_elements 0.90258
published_at 2026-04-11T12:55:00Z
7
value 0.05522
scoring_system epss
scoring_elements 0.90257
published_at 2026-04-12T12:55:00Z
8
value 0.05522
scoring_system epss
scoring_elements 0.90252
published_at 2026-04-13T12:55:00Z
9
value 0.05522
scoring_system epss
scoring_elements 0.90268
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-0906
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0906
fixed_packages
0
url pkg:deb/debian/sendmail@8.12.5?distro=trixie
purl pkg:deb/debian/sendmail@8.12.5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.5%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2002-0906
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7f7m-pgk8-jqff
5
url VCID-8g11-dp5v-yycj
vulnerability_id VCID-8g11-dp5v-yycj
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0688.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0688.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0688
reference_id
reference_type
scores
0
value 0.01711
scoring_system epss
scoring_elements 0.8227
published_at 2026-04-01T12:55:00Z
1
value 0.01711
scoring_system epss
scoring_elements 0.82283
published_at 2026-04-02T12:55:00Z
2
value 0.01711
scoring_system epss
scoring_elements 0.82303
published_at 2026-04-04T12:55:00Z
3
value 0.01711
scoring_system epss
scoring_elements 0.82297
published_at 2026-04-07T12:55:00Z
4
value 0.01711
scoring_system epss
scoring_elements 0.82324
published_at 2026-04-08T12:55:00Z
5
value 0.01711
scoring_system epss
scoring_elements 0.82332
published_at 2026-04-09T12:55:00Z
6
value 0.01711
scoring_system epss
scoring_elements 0.82351
published_at 2026-04-11T12:55:00Z
7
value 0.01711
scoring_system epss
scoring_elements 0.82345
published_at 2026-04-12T12:55:00Z
8
value 0.01711
scoring_system epss
scoring_elements 0.82339
published_at 2026-04-13T12:55:00Z
9
value 0.01711
scoring_system epss
scoring_elements 0.82374
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0688
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0688
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617065
reference_id 1617065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617065
4
reference_url https://access.redhat.com/errata/RHSA-2003:265
reference_id RHSA-2003:265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:265
fixed_packages
0
url pkg:deb/debian/sendmail@8.12.9?distro=trixie
purl pkg:deb/debian/sendmail@8.12.9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.9%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2003-0688
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8g11-dp5v-yycj
6
url VCID-8g7g-jc7b-f3fd
vulnerability_id VCID-8g7g-jc7b-f3fd
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1165.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1165.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1165
reference_id
reference_type
scores
0
value 0.01538
scoring_system epss
scoring_elements 0.81371
published_at 2026-04-11T12:55:00Z
1
value 0.01538
scoring_system epss
scoring_elements 0.81356
published_at 2026-04-12T12:55:00Z
2
value 0.01538
scoring_system epss
scoring_elements 0.81348
published_at 2026-04-13T12:55:00Z
3
value 0.01538
scoring_system epss
scoring_elements 0.81386
published_at 2026-04-16T12:55:00Z
4
value 0.01538
scoring_system epss
scoring_elements 0.81388
published_at 2026-04-18T12:55:00Z
5
value 0.029
scoring_system epss
scoring_elements 0.86287
published_at 2026-04-01T12:55:00Z
6
value 0.029
scoring_system epss
scoring_elements 0.86344
published_at 2026-04-09T12:55:00Z
7
value 0.029
scoring_system epss
scoring_elements 0.86297
published_at 2026-04-02T12:55:00Z
8
value 0.029
scoring_system epss
scoring_elements 0.86315
published_at 2026-04-04T12:55:00Z
9
value 0.029
scoring_system epss
scoring_elements 0.86316
published_at 2026-04-07T12:55:00Z
10
value 0.029
scoring_system epss
scoring_elements 0.86334
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1165
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1165
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616854
reference_id 1616854
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616854
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/21884.txt
reference_id CVE-2002-1165;OSVDB-9305
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/21884.txt
5
reference_url https://www.securityfocus.com/bid/5845/info
reference_id CVE-2002-1165;OSVDB-9305
reference_type exploit
scores
url https://www.securityfocus.com/bid/5845/info
6
reference_url https://access.redhat.com/errata/RHSA-2002:259
reference_id RHSA-2002:259
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:259
7
reference_url https://access.redhat.com/errata/RHSA-2003:073
reference_id RHSA-2003:073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:073
8
reference_url https://access.redhat.com/errata/RHSA-2003:227
reference_id RHSA-2003:227
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:227
fixed_packages
0
url pkg:deb/debian/sendmail@8.12.3-5?distro=trixie
purl pkg:deb/debian/sendmail@8.12.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.3-5%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2002-1165
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8g7g-jc7b-f3fd
7
url VCID-8x67-725v-huh9
vulnerability_id VCID-8x67-725v-huh9
summary SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-1999-1580
reference_id
reference_type
scores
0
value 0.00708
scoring_system epss
scoring_elements 0.72238
published_at 2026-04-18T12:55:00Z
1
value 0.00708
scoring_system epss
scoring_elements 0.72229
published_at 2026-04-16T12:55:00Z
2
value 0.00778
scoring_system epss
scoring_elements 0.73597
published_at 2026-04-02T12:55:00Z
3
value 0.00778
scoring_system epss
scoring_elements 0.7362
published_at 2026-04-04T12:55:00Z
4
value 0.00778
scoring_system epss
scoring_elements 0.73593
published_at 2026-04-07T12:55:00Z
5
value 0.00778
scoring_system epss
scoring_elements 0.73629
published_at 2026-04-08T12:55:00Z
6
value 0.00778
scoring_system epss
scoring_elements 0.73665
published_at 2026-04-11T12:55:00Z
7
value 0.00778
scoring_system epss
scoring_elements 0.73647
published_at 2026-04-12T12:55:00Z
8
value 0.00778
scoring_system epss
scoring_elements 0.73638
published_at 2026-04-13T12:55:00Z
9
value 0.00778
scoring_system epss
scoring_elements 0.73642
published_at 2026-04-09T12:55:00Z
10
value 0.00778
scoring_system epss
scoring_elements 0.73587
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-1999-1580
1
reference_url http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html
reference_id
reference_type
scores
url http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html
2
reference_url http://www.auscert.org.au/render.html?it=1853&cid=1978
reference_id
reference_type
scores
url http://www.auscert.org.au/render.html?it=1853&cid=1978
3
reference_url http://www.cert.org/advisories/CA-95.11.sun.sendmail-oR.vul
reference_id
reference_type
scores
url http://www.cert.org/advisories/CA-95.11.sun.sendmail-oR.vul
4
reference_url http://www.kb.cert.org/vuls/id/3278
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/3278
5
reference_url http://www.securityfocus.com/bid/7829
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/7829
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.4jl:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:sunos:4.1.4jl:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.4jl:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-1999-1580
reference_id CVE-1999-1580
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-1999-1580
fixed_packages
0
url pkg:deb/debian/sendmail@0?distro=trixie
purl pkg:deb/debian/sendmail@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@0%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-1999-1580
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8x67-725v-huh9
8
url VCID-9kez-3pxn-k7gr
vulnerability_id VCID-9kez-3pxn-k7gr
summary Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0833
reference_id
reference_type
scores
0
value 0.00664
scoring_system epss
scoring_elements 0.71149
published_at 2026-04-01T12:55:00Z
1
value 0.00664
scoring_system epss
scoring_elements 0.71159
published_at 2026-04-02T12:55:00Z
2
value 0.00664
scoring_system epss
scoring_elements 0.71176
published_at 2026-04-04T12:55:00Z
3
value 0.00664
scoring_system epss
scoring_elements 0.71151
published_at 2026-04-07T12:55:00Z
4
value 0.00664
scoring_system epss
scoring_elements 0.71193
published_at 2026-04-08T12:55:00Z
5
value 0.00664
scoring_system epss
scoring_elements 0.71206
published_at 2026-04-09T12:55:00Z
6
value 0.00664
scoring_system epss
scoring_elements 0.71229
published_at 2026-04-11T12:55:00Z
7
value 0.00664
scoring_system epss
scoring_elements 0.71215
published_at 2026-04-12T12:55:00Z
8
value 0.00664
scoring_system epss
scoring_elements 0.71199
published_at 2026-04-13T12:55:00Z
9
value 0.00664
scoring_system epss
scoring_elements 0.71245
published_at 2026-04-16T12:55:00Z
10
value 0.00664
scoring_system epss
scoring_elements 0.71252
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0833
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0833
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.1-13?distro=trixie
purl pkg:deb/debian/sendmail@8.13.1-13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.1-13%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2004-0833
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9kez-3pxn-k7gr
9
url VCID-axw2-9wxf-skes
vulnerability_id VCID-axw2-9wxf-skes
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0694.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0694
reference_id
reference_type
scores
0
value 0.7608
scoring_system epss
scoring_elements 0.98911
published_at 2026-04-01T12:55:00Z
1
value 0.7608
scoring_system epss
scoring_elements 0.98913
published_at 2026-04-02T12:55:00Z
2
value 0.7608
scoring_system epss
scoring_elements 0.98915
published_at 2026-04-04T12:55:00Z
3
value 0.7608
scoring_system epss
scoring_elements 0.98917
published_at 2026-04-07T12:55:00Z
4
value 0.7608
scoring_system epss
scoring_elements 0.98918
published_at 2026-04-09T12:55:00Z
5
value 0.7608
scoring_system epss
scoring_elements 0.9892
published_at 2026-04-12T12:55:00Z
6
value 0.7608
scoring_system epss
scoring_elements 0.98921
published_at 2026-04-13T12:55:00Z
7
value 0.7608
scoring_system epss
scoring_elements 0.98923
published_at 2026-04-16T12:55:00Z
8
value 0.7608
scoring_system epss
scoring_elements 0.98925
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0694
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617070
reference_id 1617070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617070
4
reference_url https://access.redhat.com/errata/RHSA-2003:283
reference_id RHSA-2003:283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:283
5
reference_url https://access.redhat.com/errata/RHSA-2003:284
reference_id RHSA-2003:284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:284
fixed_packages
0
url pkg:deb/debian/sendmail@8.12.10-1?distro=trixie
purl pkg:deb/debian/sendmail@8.12.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.10-1%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2003-0694
risk_score 1.4
exploitability 2.0
weighted_severity 0.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-axw2-9wxf-skes
10
url VCID-dk9t-39dj-cud4
vulnerability_id VCID-dk9t-39dj-cud4
summary
An error in the hostname matching in sendmail might enable remote
    attackers to conduct man-in-the-middle attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4565.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-4565
reference_id
reference_type
scores
0
value 0.00771
scoring_system epss
scoring_elements 0.73476
published_at 2026-04-01T12:55:00Z
1
value 0.00771
scoring_system epss
scoring_elements 0.73485
published_at 2026-04-02T12:55:00Z
2
value 0.00771
scoring_system epss
scoring_elements 0.73507
published_at 2026-04-04T12:55:00Z
3
value 0.00771
scoring_system epss
scoring_elements 0.73479
published_at 2026-04-07T12:55:00Z
4
value 0.00771
scoring_system epss
scoring_elements 0.73516
published_at 2026-04-08T12:55:00Z
5
value 0.00771
scoring_system epss
scoring_elements 0.73529
published_at 2026-04-09T12:55:00Z
6
value 0.00771
scoring_system epss
scoring_elements 0.73552
published_at 2026-04-11T12:55:00Z
7
value 0.00771
scoring_system epss
scoring_elements 0.73536
published_at 2026-04-12T12:55:00Z
8
value 0.00771
scoring_system epss
scoring_elements 0.73528
published_at 2026-04-13T12:55:00Z
9
value 0.00771
scoring_system epss
scoring_elements 0.73572
published_at 2026-04-16T12:55:00Z
10
value 0.00771
scoring_system epss
scoring_elements 0.73582
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-4565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4565
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=552622
reference_id 552622
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=552622
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=564581
reference_id 564581
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=564581
5
reference_url https://security.gentoo.org/glsa/201206-30
reference_id GLSA-201206-30
reference_type
scores
url https://security.gentoo.org/glsa/201206-30
6
reference_url https://access.redhat.com/errata/RHSA-2010:0237
reference_id RHSA-2010:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0237
7
reference_url https://access.redhat.com/errata/RHSA-2011:0262
reference_id RHSA-2011:0262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0262
fixed_packages
0
url pkg:deb/debian/sendmail@8.14.3-9.1?distro=trixie
purl pkg:deb/debian/sendmail@8.14.3-9.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.14.3-9.1%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2009-4565
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dk9t-39dj-cud4
11
url VCID-fgbr-mydh-7bhx
vulnerability_id VCID-fgbr-mydh-7bhx
summary Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4434.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4434
reference_id
reference_type
scores
0
value 0.07028
scoring_system epss
scoring_elements 0.91437
published_at 2026-04-01T12:55:00Z
1
value 0.07028
scoring_system epss
scoring_elements 0.91443
published_at 2026-04-02T12:55:00Z
2
value 0.07028
scoring_system epss
scoring_elements 0.91453
published_at 2026-04-04T12:55:00Z
3
value 0.07028
scoring_system epss
scoring_elements 0.9146
published_at 2026-04-07T12:55:00Z
4
value 0.07028
scoring_system epss
scoring_elements 0.91473
published_at 2026-04-08T12:55:00Z
5
value 0.07028
scoring_system epss
scoring_elements 0.91479
published_at 2026-04-09T12:55:00Z
6
value 0.07028
scoring_system epss
scoring_elements 0.91484
published_at 2026-04-11T12:55:00Z
7
value 0.07028
scoring_system epss
scoring_elements 0.91487
published_at 2026-04-12T12:55:00Z
8
value 0.07028
scoring_system epss
scoring_elements 0.91485
published_at 2026-04-13T12:55:00Z
9
value 0.07028
scoring_system epss
scoring_elements 0.91509
published_at 2026-04-16T12:55:00Z
10
value 0.07028
scoring_system epss
scoring_elements 0.91504
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4434
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=385054
reference_id 385054
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=385054
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.8-1?distro=trixie
purl pkg:deb/debian/sendmail@8.13.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.8-1%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2006-4434
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fgbr-mydh-7bhx
12
url VCID-fm43-r24t-h7ez
vulnerability_id VCID-fm43-r24t-h7ez
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0161.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0161
reference_id
reference_type
scores
0
value 0.67899
scoring_system epss
scoring_elements 0.98574
published_at 2026-04-01T12:55:00Z
1
value 0.67899
scoring_system epss
scoring_elements 0.98577
published_at 2026-04-02T12:55:00Z
2
value 0.67899
scoring_system epss
scoring_elements 0.9858
published_at 2026-04-04T12:55:00Z
3
value 0.67899
scoring_system epss
scoring_elements 0.98582
published_at 2026-04-07T12:55:00Z
4
value 0.67899
scoring_system epss
scoring_elements 0.98584
published_at 2026-04-08T12:55:00Z
5
value 0.67899
scoring_system epss
scoring_elements 0.98585
published_at 2026-04-09T12:55:00Z
6
value 0.67899
scoring_system epss
scoring_elements 0.98587
published_at 2026-04-12T12:55:00Z
7
value 0.67899
scoring_system epss
scoring_elements 0.98589
published_at 2026-04-13T12:55:00Z
8
value 0.67899
scoring_system epss
scoring_elements 0.98594
published_at 2026-04-16T12:55:00Z
9
value 0.67899
scoring_system epss
scoring_elements 0.98595
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0161
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0161
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616990
reference_id 1616990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616990
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/22442.c
reference_id CVE-2003-0161;OSVDB-8294
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/22442.c
5
reference_url https://www.securityfocus.com/bid/7230/info
reference_id CVE-2003-0161;OSVDB-8294
reference_type exploit
scores
url https://www.securityfocus.com/bid/7230/info
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24.c
reference_id OSVDB-8294;CVE-2003-0161
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24.c
7
reference_url https://access.redhat.com/errata/RHSA-2003:120
reference_id RHSA-2003:120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:120
8
reference_url https://access.redhat.com/errata/RHSA-2003:121
reference_id RHSA-2003:121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:121
9
reference_url https://access.redhat.com/errata/RHSA-2003:227
reference_id RHSA-2003:227
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:227
fixed_packages
0
url pkg:deb/debian/sendmail@8.12.9-1?distro=trixie
purl pkg:deb/debian/sendmail@8.12.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.9-1%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2003-0161
risk_score 1.2
exploitability 2.0
weighted_severity 0.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fm43-r24t-h7ez
13
url VCID-gycy-hbda-p3ht
vulnerability_id VCID-gycy-hbda-p3ht
summary
A vulnerability in sendmail could allow a local attacker to obtain
    sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3956.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3956.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3956
reference_id
reference_type
scores
0
value 0.001
scoring_system epss
scoring_elements 0.2782
published_at 2026-04-01T12:55:00Z
1
value 0.001
scoring_system epss
scoring_elements 0.2787
published_at 2026-04-02T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.2791
published_at 2026-04-04T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27702
published_at 2026-04-07T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.2777
published_at 2026-04-08T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27812
published_at 2026-04-09T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27818
published_at 2026-04-11T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.27776
published_at 2026-04-12T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.27719
published_at 2026-04-13T12:55:00Z
9
value 0.001
scoring_system epss
scoring_elements 0.27727
published_at 2026-04-16T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27701
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3956
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1102174
reference_id 1102174
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1102174
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750562
reference_id 750562
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750562
5
reference_url https://security.gentoo.org/glsa/201412-32
reference_id GLSA-201412-32
reference_type
scores
url https://security.gentoo.org/glsa/201412-32
fixed_packages
0
url pkg:deb/debian/sendmail@8.14.4-6?distro=trixie
purl pkg:deb/debian/sendmail@8.14.4-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.14.4-6%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2014-3956
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gycy-hbda-p3ht
14
url VCID-m7np-crvq-p3dc
vulnerability_id VCID-m7np-crvq-p3dc
summary
Faulty multipart MIME messages can cause forked Sendmail processes to
    crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1173.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1173.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1173
reference_id
reference_type
scores
0
value 0.21456
scoring_system epss
scoring_elements 0.95674
published_at 2026-04-01T12:55:00Z
1
value 0.21456
scoring_system epss
scoring_elements 0.95683
published_at 2026-04-02T12:55:00Z
2
value 0.21456
scoring_system epss
scoring_elements 0.95689
published_at 2026-04-04T12:55:00Z
3
value 0.21456
scoring_system epss
scoring_elements 0.95691
published_at 2026-04-07T12:55:00Z
4
value 0.21456
scoring_system epss
scoring_elements 0.957
published_at 2026-04-08T12:55:00Z
5
value 0.21456
scoring_system epss
scoring_elements 0.95704
published_at 2026-04-09T12:55:00Z
6
value 0.21456
scoring_system epss
scoring_elements 0.95707
published_at 2026-04-12T12:55:00Z
7
value 0.21456
scoring_system epss
scoring_elements 0.95709
published_at 2026-04-13T12:55:00Z
8
value 0.21456
scoring_system epss
scoring_elements 0.95718
published_at 2026-04-16T12:55:00Z
9
value 0.21456
scoring_system epss
scoring_elements 0.95721
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1173
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618028
reference_id 1618028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618028
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373801
reference_id 373801
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373801
5
reference_url https://security.gentoo.org/glsa/200606-19
reference_id GLSA-200606-19
reference_type
scores
url https://security.gentoo.org/glsa/200606-19
6
reference_url https://access.redhat.com/errata/RHSA-2006:0515
reference_id RHSA-2006:0515
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0515
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.7-1?distro=trixie
purl pkg:deb/debian/sendmail@8.13.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.7-1%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2006-1173
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m7np-crvq-p3dc
15
url VCID-mngh-1224-uucj
vulnerability_id VCID-mngh-1224-uucj
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1337.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1337.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1337
reference_id
reference_type
scores
0
value 0.53948
scoring_system epss
scoring_elements 0.98015
published_at 2026-04-18T12:55:00Z
1
value 0.53948
scoring_system epss
scoring_elements 0.98003
published_at 2026-04-09T12:55:00Z
2
value 0.53948
scoring_system epss
scoring_elements 0.98007
published_at 2026-04-11T12:55:00Z
3
value 0.53948
scoring_system epss
scoring_elements 0.98008
published_at 2026-04-12T12:55:00Z
4
value 0.53948
scoring_system epss
scoring_elements 0.98009
published_at 2026-04-13T12:55:00Z
5
value 0.53948
scoring_system epss
scoring_elements 0.97997
published_at 2026-04-07T12:55:00Z
6
value 0.53948
scoring_system epss
scoring_elements 0.98002
published_at 2026-04-08T12:55:00Z
7
value 0.56979
scoring_system epss
scoring_elements 0.98144
published_at 2026-04-16T12:55:00Z
8
value 0.69706
scoring_system epss
scoring_elements 0.98651
published_at 2026-04-02T12:55:00Z
9
value 0.69706
scoring_system epss
scoring_elements 0.98654
published_at 2026-04-04T12:55:00Z
10
value 0.69706
scoring_system epss
scoring_elements 0.9865
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1337
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1337
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1337
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616877
reference_id 1616877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616877
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22313.c
reference_id CVE-2002-1337;OSVDB-4502
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22313.c
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22314.c
reference_id CVE-2002-1337;OSVDB-4502
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22314.c
6
reference_url https://www.securityfocus.com/bid/6991/info
reference_id CVE-2002-1337;OSVDB-4502
reference_type exploit
scores
url https://www.securityfocus.com/bid/6991/info
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/411.c
reference_id OSVDB-4502;CVE-2002-1337
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/411.c
8
reference_url https://access.redhat.com/errata/RHSA-2003:073
reference_id RHSA-2003:073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:073
9
reference_url https://access.redhat.com/errata/RHSA-2003:074
reference_id RHSA-2003:074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:074
10
reference_url https://access.redhat.com/errata/RHSA-2003:227
reference_id RHSA-2003:227
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:227
fixed_packages
0
url pkg:deb/debian/sendmail@8.13.0.PreAlpha4?distro=trixie
purl pkg:deb/debian/sendmail@8.13.0.PreAlpha4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.0.PreAlpha4%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2002-1337
risk_score 1.2
exploitability 2.0
weighted_severity 0.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mngh-1224-uucj
16
url VCID-p9fa-ter1-3ker
vulnerability_id VCID-p9fa-ter1-3ker
summary The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which could allow local users to gain additional privileges via (1) expn, (2) checksendmail, or (3) doublebounce.pl.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0308
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19027
published_at 2026-04-01T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19162
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19214
published_at 2026-04-04T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.1893
published_at 2026-04-07T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.1901
published_at 2026-04-08T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19064
published_at 2026-04-09T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19069
published_at 2026-04-11T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19023
published_at 2026-04-12T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18971
published_at 2026-04-13T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.18925
published_at 2026-04-16T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.18938
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0308
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0308
fixed_packages
0
url pkg:deb/debian/sendmail@8.12.9-2?distro=trixie
purl pkg:deb/debian/sendmail@8.12.9-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.9-2%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2003-0308
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9fa-ter1-3ker
17
url VCID-pmae-5146-27dt
vulnerability_id VCID-pmae-5146-27dt
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0681.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0681.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0681
reference_id
reference_type
scores
0
value 0.12435
scoring_system epss
scoring_elements 0.93862
published_at 2026-04-01T12:55:00Z
1
value 0.12435
scoring_system epss
scoring_elements 0.93871
published_at 2026-04-02T12:55:00Z
2
value 0.12435
scoring_system epss
scoring_elements 0.9388
published_at 2026-04-04T12:55:00Z
3
value 0.12435
scoring_system epss
scoring_elements 0.93883
published_at 2026-04-07T12:55:00Z
4
value 0.12435
scoring_system epss
scoring_elements 0.93892
published_at 2026-04-08T12:55:00Z
5
value 0.12435
scoring_system epss
scoring_elements 0.93896
published_at 2026-04-09T12:55:00Z
6
value 0.12435
scoring_system epss
scoring_elements 0.93899
published_at 2026-04-13T12:55:00Z
7
value 0.12435
scoring_system epss
scoring_elements 0.939
published_at 2026-04-12T12:55:00Z
8
value 0.12435
scoring_system epss
scoring_elements 0.93921
published_at 2026-04-16T12:55:00Z
9
value 0.12435
scoring_system epss
scoring_elements 0.93926
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0681
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0681
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617062
reference_id 1617062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617062
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/23154.c
reference_id CVE-2003-0681;OSVDB-2577
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/23154.c
5
reference_url https://www.securityfocus.com/bid/8641/info
reference_id CVE-2003-0681;OSVDB-2577
reference_type exploit
scores
url https://www.securityfocus.com/bid/8641/info
6
reference_url https://access.redhat.com/errata/RHSA-2003:283
reference_id RHSA-2003:283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:283
fixed_packages
0
url pkg:deb/debian/sendmail@8.12.10-1?distro=trixie
purl pkg:deb/debian/sendmail@8.12.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.10-1%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2003-0681
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmae-5146-27dt
18
url VCID-qzm7-bmk8-9fgf
vulnerability_id VCID-qzm7-bmk8-9fgf
summary sendmail: SMTP smuggling vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51765.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51765.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-51765
reference_id
reference_type
scores
0
value 0.00837
scoring_system epss
scoring_elements 0.74609
published_at 2026-04-02T12:55:00Z
1
value 0.00837
scoring_system epss
scoring_elements 0.74636
published_at 2026-04-04T12:55:00Z
2
value 0.00837
scoring_system epss
scoring_elements 0.7461
published_at 2026-04-07T12:55:00Z
3
value 0.00837
scoring_system epss
scoring_elements 0.74641
published_at 2026-04-08T12:55:00Z
4
value 0.00837
scoring_system epss
scoring_elements 0.74655
published_at 2026-04-09T12:55:00Z
5
value 0.00837
scoring_system epss
scoring_elements 0.74678
published_at 2026-04-11T12:55:00Z
6
value 0.00837
scoring_system epss
scoring_elements 0.74658
published_at 2026-04-12T12:55:00Z
7
value 0.00837
scoring_system epss
scoring_elements 0.7465
published_at 2026-04-13T12:55:00Z
8
value 0.00837
scoring_system epss
scoring_elements 0.74687
published_at 2026-04-16T12:55:00Z
9
value 0.00837
scoring_system epss
scoring_elements 0.74695
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-51765
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51765
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059386
reference_id 1059386
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059386
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255869
reference_id 2255869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255869
fixed_packages
0
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.1-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-1%3Fdistro=trixie
5
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
6
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2023-51765
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzm7-bmk8-9fgf
19
url VCID-rn5g-z7bd-6qbv
vulnerability_id VCID-rn5g-z7bd-6qbv
summary Sendmail 8.9.0 through 8.12.3 allows local users to cause a denial of service by obtaining an exclusive lock on the (1) alias, (2) map, (3) statistics, and (4) pid files.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1827
reference_id
reference_type
scores
0
value 0.00754
scoring_system epss
scoring_elements 0.7317
published_at 2026-04-01T12:55:00Z
1
value 0.00754
scoring_system epss
scoring_elements 0.7318
published_at 2026-04-02T12:55:00Z
2
value 0.00754
scoring_system epss
scoring_elements 0.73201
published_at 2026-04-04T12:55:00Z
3
value 0.00754
scoring_system epss
scoring_elements 0.73175
published_at 2026-04-07T12:55:00Z
4
value 0.00754
scoring_system epss
scoring_elements 0.73211
published_at 2026-04-08T12:55:00Z
5
value 0.00754
scoring_system epss
scoring_elements 0.73224
published_at 2026-04-09T12:55:00Z
6
value 0.00754
scoring_system epss
scoring_elements 0.73249
published_at 2026-04-11T12:55:00Z
7
value 0.00754
scoring_system epss
scoring_elements 0.7323
published_at 2026-04-12T12:55:00Z
8
value 0.00754
scoring_system epss
scoring_elements 0.73223
published_at 2026-04-13T12:55:00Z
9
value 0.00754
scoring_system epss
scoring_elements 0.73266
published_at 2026-04-16T12:55:00Z
10
value 0.00754
scoring_system epss
scoring_elements 0.73275
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1827
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1827
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/21476.c
reference_id CVE-2002-1827;OSVDB-59769
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/21476.c
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/21477.c
reference_id CVE-2002-1827;OSVDB-59769
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/21477.c
4
reference_url https://www.securityfocus.com/bid/4822/info
reference_id CVE-2002-1827;OSVDB-59769
reference_type exploit
scores
url https://www.securityfocus.com/bid/4822/info
fixed_packages
0
url pkg:deb/debian/sendmail@8.12-4?distro=trixie
purl pkg:deb/debian/sendmail@8.12-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12-4%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2002-1827
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rn5g-z7bd-6qbv
20
url VCID-s44j-pgfp-zfbt
vulnerability_id VCID-s44j-pgfp-zfbt
summary Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact. NOTE: this might overlap CVE-1999-0129.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-1999-1592
reference_id
reference_type
scores
0
value 0.00394
scoring_system epss
scoring_elements 0.60358
published_at 2026-04-18T12:55:00Z
1
value 0.00394
scoring_system epss
scoring_elements 0.60187
published_at 2026-04-01T12:55:00Z
2
value 0.00394
scoring_system epss
scoring_elements 0.60264
published_at 2026-04-02T12:55:00Z
3
value 0.00394
scoring_system epss
scoring_elements 0.6029
published_at 2026-04-04T12:55:00Z
4
value 0.00394
scoring_system epss
scoring_elements 0.60258
published_at 2026-04-07T12:55:00Z
5
value 0.00394
scoring_system epss
scoring_elements 0.60308
published_at 2026-04-08T12:55:00Z
6
value 0.00394
scoring_system epss
scoring_elements 0.60322
published_at 2026-04-09T12:55:00Z
7
value 0.00394
scoring_system epss
scoring_elements 0.60343
published_at 2026-04-11T12:55:00Z
8
value 0.00394
scoring_system epss
scoring_elements 0.60329
published_at 2026-04-12T12:55:00Z
9
value 0.00394
scoring_system epss
scoring_elements 0.6031
published_at 2026-04-13T12:55:00Z
10
value 0.00394
scoring_system epss
scoring_elements 0.6035
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-1999-1592
1
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1
2
reference_url http://www.securityfocus.com/bid/243
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/243
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sendmail:sendmail:5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-1999-1592
reference_id CVE-1999-1592
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-1999-1592
fixed_packages
0
url pkg:deb/debian/sendmail@0?distro=trixie
purl pkg:deb/debian/sendmail@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@0%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-1999-1592
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s44j-pgfp-zfbt
21
url VCID-u8aq-2qhu-gff5
vulnerability_id VCID-u8aq-2qhu-gff5
summary ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3618.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3618
reference_id
reference_type
scores
0
value 0.00615
scoring_system epss
scoring_elements 0.69833
published_at 2026-04-01T12:55:00Z
1
value 0.00615
scoring_system epss
scoring_elements 0.69946
published_at 2026-04-18T12:55:00Z
2
value 0.00615
scoring_system epss
scoring_elements 0.69925
published_at 2026-04-11T12:55:00Z
3
value 0.00615
scoring_system epss
scoring_elements 0.6991
published_at 2026-04-12T12:55:00Z
4
value 0.00615
scoring_system epss
scoring_elements 0.69896
published_at 2026-04-13T12:55:00Z
5
value 0.00615
scoring_system epss
scoring_elements 0.69937
published_at 2026-04-16T12:55:00Z
6
value 0.00615
scoring_system epss
scoring_elements 0.69845
published_at 2026-04-02T12:55:00Z
7
value 0.00615
scoring_system epss
scoring_elements 0.6986
published_at 2026-04-04T12:55:00Z
8
value 0.00615
scoring_system epss
scoring_elements 0.69837
published_at 2026-04-07T12:55:00Z
9
value 0.00615
scoring_system epss
scoring_elements 0.69886
published_at 2026-04-08T12:55:00Z
10
value 0.00615
scoring_system epss
scoring_elements 0.69902
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3618
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1975623
reference_id 1975623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1975623
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991328
reference_id 991328
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991328
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991329
reference_id 991329
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991329
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991331
reference_id 991331
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991331
8
reference_url https://security.archlinux.org/AVG-2101
reference_id AVG-2101
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2101
9
reference_url https://security.archlinux.org/AVG-2102
reference_id AVG-2102
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2102
10
reference_url https://security.archlinux.org/AVG-2103
reference_id AVG-2103
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2103
11
reference_url https://usn.ubuntu.com/5371-1/
reference_id USN-5371-1
reference_type
scores
url https://usn.ubuntu.com/5371-1/
12
reference_url https://usn.ubuntu.com/5371-2/
reference_id USN-5371-2
reference_type
scores
url https://usn.ubuntu.com/5371-2/
13
reference_url https://usn.ubuntu.com/6379-1/
reference_id USN-6379-1
reference_type
scores
url https://usn.ubuntu.com/6379-1/
fixed_packages
0
url pkg:deb/debian/sendmail@8.16.1-2?distro=trixie
purl pkg:deb/debian/sendmail@8.16.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.16.1-2%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2021-3618
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u8aq-2qhu-gff5
22
url VCID-v6wg-pqrr-z7dm
vulnerability_id VCID-v6wg-pqrr-z7dm
summary Sendmail allows SSLv2 during STARTTLS, and the CipherList config option isn't supported so you can't turn it off
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7175.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7175.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-7175
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47618
published_at 2026-04-18T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.4751
published_at 2026-04-01T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47539
published_at 2026-04-02T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.4756
published_at 2026-04-09T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47508
published_at 2026-04-07T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47563
published_at 2026-04-08T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47583
published_at 2026-04-11T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.47559
published_at 2026-04-12T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47568
published_at 2026-04-13T12:55:00Z
9
value 0.00243
scoring_system epss
scoring_elements 0.47626
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-7175
2
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=172352
reference_id 172352
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=172352
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:update4:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:update4:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-7175
reference_id CVE-2006-7175
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2006-7175
fixed_packages
0
url pkg:deb/debian/sendmail@0?distro=trixie
purl pkg:deb/debian/sendmail@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@0%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2006-7175
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6wg-pqrr-z7dm
23
url VCID-y9e6-ugss-hbc8
vulnerability_id VCID-y9e6-ugss-hbc8
summary Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-2261
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69337
published_at 2026-04-01T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69349
published_at 2026-04-02T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69365
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69345
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69395
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69411
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69433
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69418
published_at 2026-04-12T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69404
published_at 2026-04-13T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69443
published_at 2026-04-16T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69454
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-2261
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2261
fixed_packages
0
url pkg:deb/debian/sendmail@8.12.7?distro=trixie
purl pkg:deb/debian/sendmail@8.12.7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.7%3Fdistro=trixie
1
url pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-u8aq-2qhu-gff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
purl pkg:deb/debian/sendmail@8.18.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie
4
url pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
purl pkg:deb/debian/sendmail@8.18.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie
aliases CVE-2002-2261
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9e6-ugss-hbc8
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie