Vulnerabilities affecting this package (0)
| Vulnerability |
Summary |
Fixed by |
|
This package is not known to be affected by vulnerabilities.
|
Vulnerabilities fixed by this package (5)
| Vulnerability |
Summary |
Aliases |
|
VCID-28we-h9bn-4ubd
|
A Improper Link Resolution Before File Access ('Link Following') vulnerability in a script called by the sendmail systemd service of openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: SUSE openSUSE Factory sendmail versions prior to 8.17.1-1.1.
|
CVE-2022-31256
|
|
VCID-6r2h-krab-7kfb
|
sendmail allows external mail with from address xxx@localhost.localdomain
|
CVE-2006-7176
|
|
VCID-8x67-725v-huh9
|
SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option.
|
CVE-1999-1580
|
|
VCID-s44j-pgfp-zfbt
|
Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact. NOTE: this might overlap CVE-1999-0129.
|
CVE-1999-1592
|
|
VCID-v6wg-pqrr-z7dm
|
Sendmail allows SSLv2 during STARTTLS, and the CipherList config option isn't supported so you can't turn it off
|
CVE-2006-7175
|