cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-29323,https://securityvulnerability.io/vulnerability/CVE-2023-29323,Remote Code Execution Vulnerability in OpenSMTPD by OpenBSD,"A flaw in the ascii_load_sockaddr function within smtpd of OpenBSD and OpenSMTPD allows for an abort when processing a connection from a local, scoped IPv6 address, potentially leading to service disruptions. This vulnerability requires immediate attention to ensure service reliability and security integrity.",OpenBSD,"OpenBSD,Opensmtpd",7.8,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2023-04-04T23:15:00.000Z,0 CVE-2020-7247,https://securityvulnerability.io/vulnerability/CVE-2020-7247,Command Execution Vulnerability in OpenSMTPD by OpenBSD,"The smtp_mailaddr function in smtp_session.c within OpenSMTPD versions 6.6 and OpenBSD 6.6 is vulnerable to command execution. Remote attackers can exploit this vulnerability by sending specially crafted SMTP commands, particularly utilizing shell metacharacters in the MAIL FROM field. This flaw arises from improper handling of return values during input validation, specifically within uncommented default configurations, allowing attackers to potentially execute arbitrary commands with root privileges.",OpenBSD,Opensmtpd,9.8,CRITICAL,0.9739099740982056,true,2022-03-25T00:00:00.000Z,false,false,true,2022-02-07T10:59:36.000Z,true,false,false,,2020-01-29T15:53:18.000Z,0 CVE-2015-7687,https://securityvulnerability.io/vulnerability/CVE-2015-7687,,Use-after-free vulnerability in OpenSMTPD before 5.7.2 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via vectors involving req_ca_vrfy_smtp and req_ca_vrfy_mta.,OpenBSD,Opensmtpd,9.8,CRITICAL,0.012799999676644802,false,,false,false,false,,,false,false,,2017-10-16T18:00:00.000Z,0 CVE-2013-2125,https://securityvulnerability.io/vulnerability/CVE-2013-2125,,"OpenSMTPD before 5.3.2 does not properly handle SSL sessions, which allows remote attackers to cause a denial of service (connection blocking) by keeping a connection open.",OpenBSD,Opensmtpd,,,0.006260000169277191,false,,false,false,false,,,false,false,,2014-05-27T15:00:00.000Z,0