Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/939236?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "type": "deb", "namespace": "debian", "name": "sendmail", "version": "8.17.1.9-2+deb12u2", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "8.18.1-1", "latest_non_vulnerable_version": "8.18.2-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/267066?format=api", "vulnerability_id": "VCID-28we-h9bn-4ubd", "summary": "A Improper Link Resolution Before File Access ('Link Following') vulnerability in a script called by the sendmail systemd service of openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: SUSE openSUSE Factory sendmail versions prior to 8.17.1-1.1.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31256", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32303", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32173", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32207", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32187", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32341", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32166", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32215", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32242", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32243", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32205", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31256" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1204696", "reference_id": "show_bug.cgi?id=1204696", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-09T19:11:41Z/" } ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1204696" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939237?format=api", "purl": "pkg:deb/debian/sendmail@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-31256" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-28we-h9bn-4ubd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51302?format=api", "vulnerability_id": "VCID-3fjk-gqgc-3yhs", "summary": "Sendmail is vulnerable to a race condition which could lead to the\n execution of arbitrary code with sendmail privileges.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0058.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0058.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0058", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.5899", "scoring_system": "epss", "scoring_elements": "0.9821", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.5899", "scoring_system": "epss", "scoring_elements": "0.98213", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.5899", "scoring_system": "epss", "scoring_elements": "0.98217", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.5899", "scoring_system": "epss", "scoring_elements": "0.98218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.5899", "scoring_system": "epss", "scoring_elements": "0.98223", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.5899", "scoring_system": "epss", "scoring_elements": "0.98226", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.5899", "scoring_system": "epss", "scoring_elements": "0.98225", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.5899", "scoring_system": "epss", "scoring_elements": "0.98231", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.5899", "scoring_system": "epss", "scoring_elements": "0.98232", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0058" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617872", "reference_id": "1617872", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617872" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358440", "reference_id": "358440", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358440" }, { "reference_url": "https://security.gentoo.org/glsa/200603-21", "reference_id": "GLSA-200603-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200603-21" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/2051.py", "reference_id": "OSVDB-24037;CVE-2006-0058", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/2051.py" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0264", "reference_id": "RHSA-2006:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0264" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0265", "reference_id": "RHSA-2006:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0265" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939251?format=api", "purl": "pkg:deb/debian/sendmail@8.13.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-0058" ], "risk_score": 1.0, "exploitability": "2.0", "weighted_severity": "0.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3fjk-gqgc-3yhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88172?format=api", "vulnerability_id": "VCID-3k8z-tghq-cbdh", "summary": "sendmail: long first header can overflow into message body", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1490.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1490.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1490", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07785", "scoring_system": "epss", "scoring_elements": "0.91926", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07785", "scoring_system": "epss", "scoring_elements": "0.91934", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07785", "scoring_system": "epss", "scoring_elements": "0.91942", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07785", "scoring_system": "epss", "scoring_elements": "0.91948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07785", "scoring_system": "epss", "scoring_elements": "0.91961", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07785", "scoring_system": "epss", "scoring_elements": "0.91966", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07785", "scoring_system": "epss", "scoring_elements": "0.91969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07785", "scoring_system": "epss", "scoring_elements": "0.91965", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07785", "scoring_system": "epss", "scoring_elements": "0.91984", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07785", "scoring_system": "epss", "scoring_elements": "0.91982", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07785", "scoring_system": "epss", "scoring_elements": "0.91977", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1490" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=499252", "reference_id": "499252", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499252" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32995.txt", "reference_id": "CVE-2009-1490;OSVDB-54669", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32995.txt" }, { "reference_url": "https://www.securityfocus.com/bid/34944/info", "reference_id": "CVE-2009-1490;OSVDB-54669", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/34944/info" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939254?format=api", "purl": "pkg:deb/debian/sendmail@8.13.2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1490" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3k8z-tghq-cbdh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88948?format=api", "vulnerability_id": "VCID-6r2h-krab-7kfb", "summary": "sendmail allows external mail with from address xxx@localhost.localdomain", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7176.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7176.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7176", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72584", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72673", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72683", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72592", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72608", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72585", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72624", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72636", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.7264", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00729", "scoring_system": "epss", "scoring_elements": "0.72631", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73325", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7176" }, { "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838" }, { "reference_url": "http://secunia.com/advisories/25098", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25098" }, { "reference_url": "http://secunia.com/advisories/25743", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25743" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html" }, { "reference_url": "http://www.securityfocus.com/bid/23742", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/23742" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=238540", "reference_id": "238540", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238540" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:update4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:update4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:update4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7176", "reference_id": "CVE-2006-7176", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0252", "reference_id": "RHSA-2007:0252", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0252" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0237", "reference_id": "RHSA-2010:0237", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0237" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939237?format=api", "purl": "pkg:deb/debian/sendmail@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-7176" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6r2h-krab-7kfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91027?format=api", "vulnerability_id": "VCID-7f7m-pgk8-jqff", "summary": "Buffer overflow in Sendmail before 8.12.5, when configured to use a custom DNS map to query TXT records, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malicious DNS server.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-0906", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05522", "scoring_system": "epss", "scoring_elements": "0.90208", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05522", "scoring_system": "epss", "scoring_elements": "0.9021", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05522", "scoring_system": "epss", "scoring_elements": "0.90223", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05522", "scoring_system": "epss", "scoring_elements": "0.90228", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05522", "scoring_system": "epss", "scoring_elements": "0.90243", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05522", "scoring_system": "epss", "scoring_elements": "0.9025", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05522", "scoring_system": "epss", "scoring_elements": "0.90258", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05522", "scoring_system": "epss", "scoring_elements": "0.90257", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05522", "scoring_system": "epss", "scoring_elements": "0.90252", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05522", "scoring_system": "epss", "scoring_elements": "0.90268", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05522", "scoring_system": "epss", "scoring_elements": "0.90264", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-0906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0906" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939241?format=api", "purl": "pkg:deb/debian/sendmail@8.12.5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2002-0906" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7f7m-pgk8-jqff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89640?format=api", "vulnerability_id": "VCID-8g11-dp5v-yycj", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0688.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0688.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0688", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01711", "scoring_system": "epss", "scoring_elements": "0.8227", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01711", "scoring_system": "epss", "scoring_elements": "0.82283", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01711", "scoring_system": "epss", "scoring_elements": "0.82303", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01711", "scoring_system": "epss", "scoring_elements": "0.82297", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01711", "scoring_system": "epss", "scoring_elements": "0.82324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01711", "scoring_system": "epss", "scoring_elements": "0.82332", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01711", "scoring_system": "epss", "scoring_elements": "0.82351", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01711", "scoring_system": "epss", "scoring_elements": "0.82345", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01711", "scoring_system": "epss", "scoring_elements": "0.82339", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01711", "scoring_system": "epss", "scoring_elements": "0.82374", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01711", "scoring_system": "epss", "scoring_elements": "0.82377", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0688" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617065", "reference_id": "1617065", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:265", "reference_id": "RHSA-2003:265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:265" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939249?format=api", "purl": "pkg:deb/debian/sendmail@8.12.9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2003-0688" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8g11-dp5v-yycj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89835?format=api", "vulnerability_id": "VCID-8g7g-jc7b-f3fd", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1165.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1165.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1165", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81389", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81356", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81348", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81386", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81388", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.029", "scoring_system": "epss", "scoring_elements": "0.86287", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.029", "scoring_system": "epss", "scoring_elements": "0.86297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.029", "scoring_system": "epss", "scoring_elements": "0.86315", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.029", "scoring_system": "epss", "scoring_elements": "0.86316", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.029", "scoring_system": "epss", "scoring_elements": "0.86334", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.029", "scoring_system": "epss", "scoring_elements": "0.86344", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1165" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854", "reference_id": "1616854", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/21884.txt", "reference_id": "CVE-2002-1165;OSVDB-9305", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/21884.txt" }, { "reference_url": "https://www.securityfocus.com/bid/5845/info", "reference_id": "CVE-2002-1165;OSVDB-9305", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/5845/info" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:259", "reference_id": "RHSA-2002:259", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:259" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:073", "reference_id": "RHSA-2003:073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:227", "reference_id": "RHSA-2003:227", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939242?format=api", "purl": "pkg:deb/debian/sendmail@8.12.3-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.3-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2002-1165" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8g7g-jc7b-f3fd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97908?format=api", "vulnerability_id": "VCID-8x67-725v-huh9", "summary": "SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-1999-1580", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00708", "scoring_system": "epss", "scoring_elements": "0.72224", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00708", "scoring_system": "epss", "scoring_elements": "0.72229", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00708", "scoring_system": "epss", "scoring_elements": "0.72238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00778", "scoring_system": "epss", "scoring_elements": "0.7362", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00778", "scoring_system": "epss", "scoring_elements": "0.73593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00778", "scoring_system": "epss", "scoring_elements": "0.73629", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00778", "scoring_system": "epss", "scoring_elements": "0.73665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00778", "scoring_system": "epss", "scoring_elements": "0.73647", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00778", "scoring_system": "epss", "scoring_elements": "0.73638", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00778", "scoring_system": "epss", "scoring_elements": "0.73642", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00778", "scoring_system": "epss", "scoring_elements": "0.73587", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00778", "scoring_system": "epss", "scoring_elements": "0.73597", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-1999-1580" }, { "reference_url": "http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html" }, { "reference_url": "http://www.auscert.org.au/render.html?it=1853&cid=1978", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.auscert.org.au/render.html?it=1853&cid=1978" }, { "reference_url": "http://www.cert.org/advisories/CA-95.11.sun.sendmail-oR.vul", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cert.org/advisories/CA-95.11.sun.sendmail-oR.vul" }, { "reference_url": "http://www.kb.cert.org/vuls/id/3278", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/3278" }, { "reference_url": "http://www.securityfocus.com/bid/7829", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/7829" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.4jl:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sun:sunos:4.1.4jl:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.4jl:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-1999-1580", "reference_id": "CVE-1999-1580", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-1999-1580" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939237?format=api", "purl": "pkg:deb/debian/sendmail@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-1999-1580" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8x67-725v-huh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91206?format=api", "vulnerability_id": "VCID-9kez-3pxn-k7gr", "summary": "Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0833", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71149", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71159", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71176", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71151", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71193", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71206", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71229", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71215", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71199", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71245", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71252", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0833" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0833", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0833" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939250?format=api", "purl": "pkg:deb/debian/sendmail@8.13.1-13?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.1-13%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0833" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9kez-3pxn-k7gr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89621?format=api", "vulnerability_id": "VCID-axw2-9wxf-skes", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0694.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0694.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0694", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.7608", "scoring_system": "epss", "scoring_elements": "0.98911", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.7608", "scoring_system": "epss", "scoring_elements": "0.98913", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.7608", "scoring_system": "epss", "scoring_elements": "0.98915", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.7608", "scoring_system": "epss", "scoring_elements": "0.98917", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.7608", "scoring_system": "epss", "scoring_elements": "0.98918", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.7608", "scoring_system": "epss", "scoring_elements": "0.9892", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.7608", "scoring_system": "epss", "scoring_elements": "0.98921", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.7608", "scoring_system": "epss", "scoring_elements": "0.98923", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.7608", "scoring_system": "epss", "scoring_elements": "0.98925", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.7608", "scoring_system": "epss", "scoring_elements": "0.98927", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0694" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617070", "reference_id": "1617070", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617070" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:283", "reference_id": "RHSA-2003:283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:284", "reference_id": "RHSA-2003:284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:284" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939248?format=api", "purl": "pkg:deb/debian/sendmail@8.12.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2003-0694" ], "risk_score": 1.4, "exploitability": "2.0", "weighted_severity": "0.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-axw2-9wxf-skes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49053?format=api", "vulnerability_id": "VCID-dk9t-39dj-cud4", "summary": "An error in the hostname matching in sendmail might enable remote\n attackers to conduct man-in-the-middle attacks.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4565.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4565.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4565", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00771", "scoring_system": "epss", "scoring_elements": "0.73476", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00771", "scoring_system": "epss", "scoring_elements": "0.73485", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00771", "scoring_system": "epss", "scoring_elements": "0.73507", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00771", "scoring_system": "epss", "scoring_elements": "0.73479", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00771", "scoring_system": "epss", "scoring_elements": "0.73516", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00771", "scoring_system": "epss", "scoring_elements": "0.73529", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00771", "scoring_system": "epss", "scoring_elements": "0.73552", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00771", "scoring_system": "epss", "scoring_elements": "0.73536", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00771", "scoring_system": "epss", "scoring_elements": "0.73528", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00771", "scoring_system": "epss", "scoring_elements": "0.73572", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00771", "scoring_system": "epss", "scoring_elements": "0.73582", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00771", "scoring_system": "epss", "scoring_elements": "0.73575", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4565" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=552622", "reference_id": "552622", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552622" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=564581", "reference_id": "564581", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=564581" }, { "reference_url": "https://security.gentoo.org/glsa/201206-30", "reference_id": "GLSA-201206-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201206-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0237", "reference_id": "RHSA-2010:0237", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0237" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0262", "reference_id": "RHSA-2011:0262", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0262" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939255?format=api", "purl": "pkg:deb/debian/sendmail@8.14.3-9.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.14.3-9.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-4565" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dk9t-39dj-cud4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90377?format=api", "vulnerability_id": "VCID-fgbr-mydh-7bhx", "summary": "Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long \"header line\", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying \"The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected.\"", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4434.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4434.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4434", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07028", "scoring_system": "epss", "scoring_elements": "0.91437", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07028", "scoring_system": "epss", "scoring_elements": "0.91443", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07028", "scoring_system": "epss", "scoring_elements": "0.91453", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07028", "scoring_system": "epss", "scoring_elements": "0.9146", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07028", "scoring_system": "epss", "scoring_elements": "0.91473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07028", "scoring_system": "epss", "scoring_elements": "0.91479", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07028", "scoring_system": "epss", "scoring_elements": "0.91484", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07028", "scoring_system": "epss", "scoring_elements": "0.91487", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07028", "scoring_system": "epss", "scoring_elements": "0.91485", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07028", "scoring_system": "epss", "scoring_elements": "0.91509", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07028", "scoring_system": "epss", "scoring_elements": "0.91504", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4434" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=385054", "reference_id": "385054", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=385054" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939253?format=api", "purl": "pkg:deb/debian/sendmail@8.13.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-4434" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fgbr-mydh-7bhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89712?format=api", "vulnerability_id": "VCID-fm43-r24t-h7ez", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0161.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0161.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0161", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.67899", "scoring_system": "epss", "scoring_elements": "0.98574", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.67899", "scoring_system": "epss", "scoring_elements": "0.98577", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.67899", "scoring_system": "epss", "scoring_elements": "0.9858", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.67899", "scoring_system": "epss", "scoring_elements": "0.98582", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.67899", "scoring_system": "epss", "scoring_elements": "0.98584", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.67899", "scoring_system": "epss", "scoring_elements": "0.98585", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.67899", "scoring_system": "epss", "scoring_elements": "0.98587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.67899", "scoring_system": "epss", "scoring_elements": "0.98589", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.67899", "scoring_system": "epss", "scoring_elements": "0.98594", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.67899", "scoring_system": "epss", "scoring_elements": "0.98595", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.67899", "scoring_system": "epss", "scoring_elements": "0.98593", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0161" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616990", "reference_id": "1616990", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616990" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/22442.c", "reference_id": "CVE-2003-0161;OSVDB-8294", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/local/22442.c" }, { "reference_url": "https://www.securityfocus.com/bid/7230/info", "reference_id": "CVE-2003-0161;OSVDB-8294", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/7230/info" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24.c", "reference_id": "OSVDB-8294;CVE-2003-0161", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:120", "reference_id": "RHSA-2003:120", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:120" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:121", "reference_id": "RHSA-2003:121", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:121" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:227", "reference_id": "RHSA-2003:227", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939246?format=api", "purl": "pkg:deb/debian/sendmail@8.12.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2003-0161" ], "risk_score": 1.2, "exploitability": "2.0", "weighted_severity": "0.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fm43-r24t-h7ez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41635?format=api", "vulnerability_id": "VCID-gycy-hbda-p3ht", "summary": "A vulnerability in sendmail could allow a local attacker to obtain\n sensitive information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3956.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3956.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3956", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23676", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.2787", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.2791", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27702", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.2777", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27812", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.2782", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27776", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27719", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27727", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27701", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27818", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3956" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102174", "reference_id": "1102174", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102174" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750562", "reference_id": "750562", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750562" }, { "reference_url": "https://security.gentoo.org/glsa/201412-32", "reference_id": "GLSA-201412-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-32" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939256?format=api", "purl": "pkg:deb/debian/sendmail@8.14.4-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.14.4-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-3956" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gycy-hbda-p3ht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59761?format=api", "vulnerability_id": "VCID-m7np-crvq-p3dc", "summary": "Faulty multipart MIME messages can cause forked Sendmail processes to\n crash.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1173.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1173.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1173", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.21456", "scoring_system": "epss", "scoring_elements": "0.95674", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.21456", "scoring_system": "epss", "scoring_elements": "0.95683", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.21456", "scoring_system": "epss", "scoring_elements": "0.95689", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.21456", "scoring_system": "epss", "scoring_elements": "0.95691", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.21456", "scoring_system": "epss", "scoring_elements": "0.957", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.21456", "scoring_system": "epss", "scoring_elements": "0.95704", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.21456", "scoring_system": "epss", "scoring_elements": "0.95707", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.21456", "scoring_system": "epss", "scoring_elements": "0.95709", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.21456", "scoring_system": "epss", "scoring_elements": "0.95718", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.21456", "scoring_system": "epss", "scoring_elements": "0.95721", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.21456", "scoring_system": "epss", "scoring_elements": "0.95722", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1173" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618028", "reference_id": "1618028", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618028" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373801", "reference_id": "373801", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373801" }, { "reference_url": "https://security.gentoo.org/glsa/200606-19", "reference_id": "GLSA-200606-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0515", "reference_id": "RHSA-2006:0515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0515" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939252?format=api", "purl": "pkg:deb/debian/sendmail@8.13.7-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.7-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-1173" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m7np-crvq-p3dc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89736?format=api", "vulnerability_id": "VCID-mngh-1224-uucj", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1337.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1337.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1337", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.51995", "scoring_system": "epss", "scoring_elements": "0.97922", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.53948", "scoring_system": "epss", "scoring_elements": "0.98007", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.53948", "scoring_system": "epss", "scoring_elements": "0.98003", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.53948", "scoring_system": "epss", "scoring_elements": "0.98008", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.53948", "scoring_system": "epss", "scoring_elements": "0.98009", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.53948", "scoring_system": "epss", "scoring_elements": "0.98015", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.53948", "scoring_system": "epss", "scoring_elements": "0.97997", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.53948", "scoring_system": "epss", "scoring_elements": "0.98002", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.56979", "scoring_system": "epss", "scoring_elements": "0.98144", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.69706", "scoring_system": "epss", "scoring_elements": "0.98654", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.69706", "scoring_system": "epss", "scoring_elements": "0.9865", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.69706", "scoring_system": "epss", "scoring_elements": "0.98651", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1337" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1337", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1337" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877", "reference_id": "1616877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22313.c", "reference_id": "CVE-2002-1337;OSVDB-4502", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22313.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22314.c", "reference_id": "CVE-2002-1337;OSVDB-4502", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/22314.c" }, { "reference_url": "https://www.securityfocus.com/bid/6991/info", "reference_id": "CVE-2002-1337;OSVDB-4502", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/6991/info" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/411.c", "reference_id": "OSVDB-4502;CVE-2002-1337", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/411.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:073", "reference_id": "RHSA-2003:073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:074", "reference_id": "RHSA-2003:074", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:074" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:227", "reference_id": "RHSA-2003:227", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939243?format=api", "purl": "pkg:deb/debian/sendmail@8.13.0.PreAlpha4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.13.0.PreAlpha4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2002-1337" ], "risk_score": 1.2, "exploitability": "2.0", "weighted_severity": "0.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mngh-1224-uucj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91098?format=api", "vulnerability_id": "VCID-p9fa-ter1-3ker", "summary": "The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which could allow local users to gain additional privileges via (1) expn, (2) checksendmail, or (3) doublebounce.pl.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0308", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19027", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19162", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19214", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1893", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1901", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19064", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19069", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19023", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18971", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18925", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18938", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18948", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0308" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0308", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0308" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939247?format=api", "purl": "pkg:deb/debian/sendmail@8.12.9-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.9-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2003-0308" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p9fa-ter1-3ker" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89620?format=api", "vulnerability_id": "VCID-pmae-5146-27dt", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0681.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0681.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0681", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12435", "scoring_system": "epss", "scoring_elements": "0.93862", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12435", "scoring_system": "epss", "scoring_elements": "0.93871", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12435", "scoring_system": "epss", "scoring_elements": "0.9388", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12435", "scoring_system": "epss", "scoring_elements": "0.93883", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12435", "scoring_system": "epss", "scoring_elements": "0.93892", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12435", "scoring_system": "epss", "scoring_elements": "0.93896", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12435", "scoring_system": "epss", "scoring_elements": "0.93899", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12435", "scoring_system": "epss", "scoring_elements": "0.939", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.12435", "scoring_system": "epss", "scoring_elements": "0.93921", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12435", "scoring_system": "epss", "scoring_elements": "0.93926", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.12435", "scoring_system": "epss", "scoring_elements": "0.93928", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0681" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0681" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617062", "reference_id": "1617062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617062" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/23154.c", "reference_id": "CVE-2003-0681;OSVDB-2577", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/23154.c" }, { "reference_url": "https://www.securityfocus.com/bid/8641/info", "reference_id": "CVE-2003-0681;OSVDB-2577", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/8641/info" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:283", "reference_id": "RHSA-2003:283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:283" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939248?format=api", "purl": "pkg:deb/debian/sendmail@8.12.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2003-0681" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmae-5146-27dt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77892?format=api", "vulnerability_id": "VCID-qzm7-bmk8-9fgf", "summary": "sendmail: SMTP smuggling vulnerability", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51765.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51765.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-51765", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00837", "scoring_system": "epss", "scoring_elements": "0.74609", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00837", "scoring_system": "epss", "scoring_elements": "0.74636", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00837", "scoring_system": "epss", "scoring_elements": "0.7461", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00837", "scoring_system": "epss", "scoring_elements": "0.74641", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00837", "scoring_system": "epss", "scoring_elements": "0.74655", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00837", "scoring_system": "epss", "scoring_elements": "0.74678", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00837", "scoring_system": "epss", "scoring_elements": "0.74658", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00837", "scoring_system": "epss", "scoring_elements": "0.7465", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00837", "scoring_system": "epss", "scoring_elements": "0.74687", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00837", "scoring_system": "epss", "scoring_elements": "0.74695", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00837", "scoring_system": "epss", "scoring_elements": "0.74686", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-51765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51765" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059386", "reference_id": "1059386", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059386" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255869", "reference_id": "2255869", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255869" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939259?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939258?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939260?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-51765" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qzm7-bmk8-9fgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91065?format=api", "vulnerability_id": "VCID-rn5g-z7bd-6qbv", "summary": "Sendmail 8.9.0 through 8.12.3 allows local users to cause a denial of service by obtaining an exclusive lock on the (1) alias, (2) map, (3) statistics, and (4) pid files.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.7317", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.7318", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73201", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73175", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73211", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73224", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73249", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.7323", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73223", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73266", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73275", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73268", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1827" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/21476.c", "reference_id": "CVE-2002-1827;OSVDB-59769", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/21476.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/21477.c", "reference_id": "CVE-2002-1827;OSVDB-59769", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/21477.c" }, { "reference_url": "https://www.securityfocus.com/bid/4822/info", "reference_id": "CVE-2002-1827;OSVDB-59769", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/4822/info" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939244?format=api", "purl": "pkg:deb/debian/sendmail@8.12-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2002-1827" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rn5g-z7bd-6qbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/99303?format=api", "vulnerability_id": "VCID-s44j-pgfp-zfbt", "summary": "Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact. NOTE: this might overlap CVE-1999-0129.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-1999-1592", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60346", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60187", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60264", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.6029", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60258", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60308", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60322", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60343", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60329", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.6031", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.6035", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60358", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-1999-1592" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1" }, { "reference_url": "http://www.securityfocus.com/bid/243", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/243" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sendmail:sendmail:5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-1999-1592", "reference_id": "CVE-1999-1592", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-1999-1592" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939237?format=api", "purl": "pkg:deb/debian/sendmail@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-1999-1592" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s44j-pgfp-zfbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80226?format=api", "vulnerability_id": "VCID-u8aq-2qhu-gff5", "summary": "ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3618.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3618.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3618", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69833", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69928", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.6991", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69896", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69946", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69845", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.6986", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69837", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69886", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69902", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00615", "scoring_system": "epss", "scoring_elements": "0.69925", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3618" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975623", "reference_id": "1975623", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975623" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991328", "reference_id": "991328", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991328" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991329", "reference_id": "991329", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991329" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991331", "reference_id": "991331", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991331" }, { "reference_url": "https://security.archlinux.org/AVG-2101", "reference_id": "AVG-2101", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2101" }, { "reference_url": "https://security.archlinux.org/AVG-2102", "reference_id": "AVG-2102", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2102" }, { "reference_url": "https://security.archlinux.org/AVG-2103", "reference_id": "AVG-2103", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2103" }, { "reference_url": "https://usn.ubuntu.com/5371-1/", "reference_id": "USN-5371-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5371-1/" }, { "reference_url": "https://usn.ubuntu.com/5371-2/", "reference_id": "USN-5371-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5371-2/" }, { "reference_url": "https://usn.ubuntu.com/6379-1/", "reference_id": "USN-6379-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6379-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939257?format=api", "purl": "pkg:deb/debian/sendmail@8.16.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.16.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-3618" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u8aq-2qhu-gff5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90667?format=api", "vulnerability_id": "VCID-v6wg-pqrr-z7dm", "summary": "Sendmail allows SSLv2 during STARTTLS, and the CipherList config option isn't supported so you can't turn it off", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7175.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7175.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7175", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47571", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.4751", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47539", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.4756", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47563", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47583", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47559", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47568", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47626", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47618", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-7175" }, { "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=172352", "reference_id": "172352", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172352" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:update4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:update4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:update4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7175", "reference_id": "CVE-2006-7175", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7175" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939237?format=api", "purl": "pkg:deb/debian/sendmail@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-7175" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v6wg-pqrr-z7dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91075?format=api", "vulnerability_id": "VCID-y9e6-ugss-hbc8", "summary": "Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-2261", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69337", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69349", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69365", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69345", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69395", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69411", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69433", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69418", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69404", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69443", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69454", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69435", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-2261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2261" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939245?format=api", "purl": "pkg:deb/debian/sendmail@8.12.7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.12.7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939238?format=api", "purl": "pkg:deb/debian/sendmail@8.15.2-22%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-u8aq-2qhu-gff5" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.15.2-22%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939236?format=api", "purl": "pkg:deb/debian/sendmail@8.17.1.9-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939240?format=api", "purl": "pkg:deb/debian/sendmail@8.18.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939239?format=api", "purl": "pkg:deb/debian/sendmail@8.18.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.18.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2002-2261" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y9e6-ugss-hbc8" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sendmail@8.17.1.9-2%252Bdeb12u2%3Fdistro=trixie" }