Логотип exploitDog
bind:"CVE-2019-12420" OR bind:"CVE-2020-1930" OR bind:"CVE-2018-11805" OR bind:"CVE-2020-1931"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-12420" OR bind:"CVE-2020-1930" OR bind:"CVE-2018-11805" OR bind:"CVE-2020-1931"

Количество 35

Количество 35

oracle-oval логотип

ELSA-2020-4625

больше 5 лет назад

ELSA-2020-4625: spamassassin security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0446-1

почти 6 лет назад

Security update for spamassassin

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0813-1

почти 6 лет назад

Security update for spamassassin

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0811-1

почти 6 лет назад

Security update for spamassassin

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0810-1

почти 6 лет назад

Security update for spamassassin

EPSS: Низкий
ubuntu логотип

CVE-2019-12420

около 6 лет назад

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2019-12420

около 6 лет назад

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2019-12420

около 6 лет назад

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2019-12420

около 6 лет назад

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-q6ww-c56f-5fhw

больше 3 лет назад

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.

CVSS3: 7.5
EPSS: Средний
oracle-oval логотип

ELSA-2020-3973

больше 5 лет назад

ELSA-2020-3973: spamassassin security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2020-01978

около 6 лет назад

Уязвимость программного средства для фильтрации спама Apache SpamAssassin, связанная с недостатком механизма контроля используемых ресурсов, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2021:0551-1

почти 5 лет назад

Security update for spamassassin

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1163-1

почти 5 лет назад

Security update for spamassassin

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1153-1

почти 5 лет назад

Security update for spamassassin

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1152-1

почти 5 лет назад

Security update for spamassassin

EPSS: Низкий
ubuntu логотип

CVE-2020-1930

около 6 лет назад

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious rule configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. With this bug unpatched, exploits can be injected in a number of scenarios including the same privileges as spamd is run which may be elevated though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places. If you cannot upgrade, do not use 3rd party rulesets, do not use sa-compile and do not run spamd as an account with elevated privileges.

CVSS3: 8.1
EPSS: Низкий
redhat логотип

CVE-2020-1930

около 6 лет назад

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious rule configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. With this bug unpatched, exploits can be injected in a number of scenarios including the same privileges as spamd is run which may be elevated though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places. If you cannot upgrade, do not use 3rd party rulesets, do not use sa-compile and do not run spamd as an account with elevated privileges.

CVSS3: 6.7
EPSS: Низкий
nvd логотип

CVE-2020-1930

около 6 лет назад

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious rule configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. With this bug unpatched, exploits can be injected in a number of scenarios including the same privileges as spamd is run which may be elevated though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places. If you cannot upgrade, do not use 3rd party rulesets, do not use sa-compile and do not run spamd as an account with elevated privileges.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2020-1930

около 6 лет назад

A command execution issue was found in Apache SpamAssassin prior to 3. ...

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2020-4625

ELSA-2020-4625: spamassassin security update (MODERATE)

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0446-1

Security update for spamassassin

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0813-1

Security update for spamassassin

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0811-1

Security update for spamassassin

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0810-1

Security update for spamassassin

почти 6 лет назад
ubuntu логотип
CVE-2019-12420

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.

CVSS3: 7.5
14%
Средний
около 6 лет назад
redhat логотип
CVE-2019-12420

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.

CVSS3: 7.5
14%
Средний
около 6 лет назад
nvd логотип
CVE-2019-12420

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.

CVSS3: 7.5
14%
Средний
около 6 лет назад
debian логотип
CVE-2019-12420

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way ...

CVSS3: 7.5
14%
Средний
около 6 лет назад
github логотип
GHSA-q6ww-c56f-5fhw

In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.

CVSS3: 7.5
14%
Средний
больше 3 лет назад
oracle-oval логотип
ELSA-2020-3973

ELSA-2020-3973: spamassassin security update (MODERATE)

больше 5 лет назад
fstec логотип
BDU:2020-01978

Уязвимость программного средства для фильтрации спама Apache SpamAssassin, связанная с недостатком механизма контроля используемых ресурсов, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 7.5
14%
Средний
около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0551-1

Security update for spamassassin

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:1163-1

Security update for spamassassin

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:1153-1

Security update for spamassassin

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:1152-1

Security update for spamassassin

почти 5 лет назад
ubuntu логотип
CVE-2020-1930

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious rule configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. With this bug unpatched, exploits can be injected in a number of scenarios including the same privileges as spamd is run which may be elevated though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places. If you cannot upgrade, do not use 3rd party rulesets, do not use sa-compile and do not run spamd as an account with elevated privileges.

CVSS3: 8.1
1%
Низкий
около 6 лет назад
redhat логотип
CVE-2020-1930

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious rule configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. With this bug unpatched, exploits can be injected in a number of scenarios including the same privileges as spamd is run which may be elevated though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places. If you cannot upgrade, do not use 3rd party rulesets, do not use sa-compile and do not run spamd as an account with elevated privileges.

CVSS3: 6.7
1%
Низкий
около 6 лет назад
nvd логотип
CVE-2020-1930

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious rule configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. With this bug unpatched, exploits can be injected in a number of scenarios including the same privileges as spamd is run which may be elevated though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places. If you cannot upgrade, do not use 3rd party rulesets, do not use sa-compile and do not run spamd as an account with elevated privileges.

CVSS3: 8.1
1%
Низкий
около 6 лет назад
debian логотип
CVE-2020-1930

A command execution issue was found in Apache SpamAssassin prior to 3. ...

CVSS3: 8.1
1%
Низкий
около 6 лет назад

Уязвимостей на страницу