Логотип exploitDog
product: "postfix"
Консоль
Логотип exploitDog

exploitDog

product: "postfix"
postfix

postfixагент передачи почты (MTA — mail transfer agent).

Релизный цикл, информация об уязвимостях

Продукт: postfix
Вендор: postfix

График релизов

3.53.63.73.83.93.1020202021202220232024202520262027

Недавние уязвимости postfix

Количество 72

nvd логотип

CVE-2005-0337

больше 20 лет назад

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2005-0337

больше 20 лет назад

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_ ...

CVSS2: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2005-0337

больше 20 лет назад

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.

CVSS2: 7.5
EPSS: Низкий
redhat логотип

CVE-2005-0337

почти 21 год назад

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.

EPSS: Низкий
nvd логотип

CVE-2003-0540

больше 22 лет назад

The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.

CVSS2: 5
EPSS: Средний
nvd логотип

CVE-2003-0468

больше 22 лет назад

Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2003-0540

больше 22 лет назад

The address parser code in Postfix 1.1.12 and earlier allows remote at ...

CVSS2: 5
EPSS: Средний
debian логотип

CVE-2003-0468

больше 22 лет назад

Postfix 1.1.11 and earlier allows remote attackers to use Postfix to c ...

CVSS2: 5
EPSS: Низкий
redhat логотип

CVE-2003-0540

больше 22 лет назад

The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.

EPSS: Средний
redhat логотип

CVE-2003-0468

больше 22 лет назад

Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2005-0337

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.

CVSS2: 7.5
1%
Низкий
больше 20 лет назад
debian логотип
CVE-2005-0337

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_ ...

CVSS2: 7.5
1%
Низкий
больше 20 лет назад
ubuntu логотип
CVE-2005-0337

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.

CVSS2: 7.5
1%
Низкий
больше 20 лет назад
redhat логотип
CVE-2005-0337

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.

1%
Низкий
почти 21 год назад
nvd логотип
CVE-2003-0540

The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.

CVSS2: 5
57%
Средний
больше 22 лет назад
nvd логотип
CVE-2003-0468

Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.

CVSS2: 5
2%
Низкий
больше 22 лет назад
debian логотип
CVE-2003-0540

The address parser code in Postfix 1.1.12 and earlier allows remote at ...

CVSS2: 5
57%
Средний
больше 22 лет назад
debian логотип
CVE-2003-0468

Postfix 1.1.11 and earlier allows remote attackers to use Postfix to c ...

CVSS2: 5
2%
Низкий
больше 22 лет назад
redhat логотип
CVE-2003-0540

The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.

57%
Средний
больше 22 лет назад
redhat логотип
CVE-2003-0468

Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.

2%
Низкий
больше 22 лет назад

Уязвимостей на страницу


Поделиться