Search for vulnerabilities
Vulnerability details: VCID-zepg-48u5-aaad
Vulnerability ID VCID-zepg-48u5-aaad
Aliases CVE-2002-1337
Summary Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.29951 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.623 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.623 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.623 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.623 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.623 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.623 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.623 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.623 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.623 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.6337 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.6337 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.6337 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.6337 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.6337 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.6337 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.6337 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.6337 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.6337 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.6337 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.6337 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.6337 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.64673 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.85962 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.85962 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.85962 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.85962 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.89176 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.89176 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.89176 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.89176 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.89176 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.89176 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.89176 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.89176 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.89176 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
epss 0.89176 https://api.first.org/data/v1/epss?cve=CVE-2002-1337
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=1616877
Data source Exploit-DB
Date added March 2, 2003
Description Sendmail 8.12.x - Header Processing Buffer Overflow (2)
Ransomware campaign use Known
Source publication date March 2, 2003
Exploit type remote
Platform unix
Source update date Oct. 28, 2012
Source URL https://www.securityfocus.com/bid/6991/info
Exploit Prediction Scoring System (EPSS)
Percentile 0.94708
EPSS Score 0.29951
Published At March 29, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.