Логотип exploitDog
bind:CVE-2020-7247
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-7247

Количество 5

Количество 5

ubuntu логотип

CVE-2020-7247

около 6 лет назад

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.

CVSS3: 9.8
EPSS: Критический
nvd логотип

CVE-2020-7247

около 6 лет назад

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.

CVSS3: 9.8
EPSS: Критический
debian логотип

CVE-2020-7247

около 6 лет назад

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6 ...

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-rcw6-69h3-89fh

больше 3 лет назад

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2020-00579

около 6 лет назад

Уязвимость функции smtp_mailaddr (smtp_session.c) почтового демона OpenSMTPD операционной системы OpenBSD, позволяющая нарушителю повысить свои привилегии выполнить произвольные команды с привилегиями root

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-7247

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.

CVSS3: 9.8
94%
Критический
около 6 лет назад
nvd логотип
CVE-2020-7247

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.

CVSS3: 9.8
94%
Критический
около 6 лет назад
debian логотип
CVE-2020-7247

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6 ...

CVSS3: 9.8
94%
Критический
около 6 лет назад
github логотип
GHSA-rcw6-69h3-89fh

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.

CVSS3: 9.8
94%
Критический
больше 3 лет назад
fstec логотип
BDU:2020-00579

Уязвимость функции smtp_mailaddr (smtp_session.c) почтового демона OpenSMTPD операционной системы OpenBSD, позволяющая нарушителю повысить свои привилегии выполнить произвольные команды с привилегиями root

CVSS3: 9.8
94%
Критический
около 6 лет назад

Уязвимостей на страницу