Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown

CVE-2007-2873

Disclosure Date: June 11, 2007 (last updated October 04, 2023)
SpamAssassin 3.1.x, 3.2.0, and 3.2.1 before 20070611, when running as root in unusual configurations using vpopmail or virtual users, allows local users to cause a denial of service (corrupt arbitrary files) via a symlink attack on a file that is used by spamd.
0
Attacker Value
Unknown

CVE-2007-0451

Disclosure Date: February 16, 2007 (last updated October 04, 2023)
Apache SpamAssassin before 3.1.8 allows remote attackers to cause a denial of service via long URLs in malformed HTML, which triggers "massive memory usage."
0
Attacker Value
Unknown

CVE-2006-2447

Disclosure Date: June 06, 2006 (last updated October 04, 2023)
SpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username.
0
Attacker Value
Unknown

CVE-2005-3351

Disclosure Date: November 20, 2005 (last updated February 22, 2025)
SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients ("To" addresses), which triggers a bus error in Perl.
0
Attacker Value
Unknown

CVE-2005-1266

Disclosure Date: June 15, 2005 (last updated February 22, 2025)
Apache SpamAssassin 3.0.1, 3.0.2, and 3.0.3 allows remote attackers to cause a denial of service (CPU consumption and slowdown) via a message with a long Content-Type header without any boundaries.
0
Attacker Value
Unknown

CVE-2004-0796

Disclosure Date: October 20, 2004 (last updated February 22, 2025)
SpamAssassin 2.5x, and 2.6x before 2.64, allows remote attackers to cause a denial of service via certain malformed messages.
0
Attacker Value
Unknown

CVE-2003-1557

Disclosure Date: December 31, 2003 (last updated February 22, 2025)
Off-by-one buffer overflow in spamc of SpamAssassin 2.40 through 2.43, when using BSMTP mode ("-B"), allows remote attackers to execute arbitrary code via email containing headers with leading "." characters.
0