Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
postfix postfix 2.4.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-3889
Postfix 2.4 prior to 2.4.9, 2.5 prior to 2.5.5, and 2.6 prior to 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application slowdown or ex...
Postfix Postfix 2.4
Postfix Postfix 2.4.0
Postfix Postfix 2.4.7
Postfix Postfix 2.5.1
Postfix Postfix 2.4.5
Postfix Postfix 2.4.6
Postfix Postfix 2.4.1
Postfix Postfix 2.4.2
Postfix Postfix 2.5.2
Postfix Postfix 2.5.3
Postfix Postfix 2.4.3
Postfix Postfix 2.4.4
Postfix Postfix 2.4.8
Postfix Postfix 2.6
NA
CVE-2008-2936
Postfix prior to 2.3.15, 2.4 prior to 2.4.8, 2.5 prior to 2.5.4, and 2.6 prior to 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this ...
Postfix Postfix 2.5.0
Postfix Postfix 2.3.11
Postfix Postfix 2.3.6
Postfix Postfix 2.3.0
Postfix Postfix 2.5.2
Postfix Postfix 2.4.0
Postfix Postfix 2.3.12
Postfix Postfix 2.3.10
Postfix Postfix 2.4.5
Postfix Postfix 2.3.9
Postfix Postfix 2.3.2
Postfix Postfix 2.3.7
Postfix Postfix 2.3.14
Postfix Postfix 2.4.3
Postfix Postfix 2.5.3
Postfix Postfix 2.6.0
Postfix Postfix 2.4.7
Postfix Postfix 2.4.2
Postfix Postfix 2.3.4
Postfix Postfix 2.3.3
Postfix Postfix 2.3.1
Postfix Postfix 2.5.1
1 EDB exploit
NA
CVE-2011-0411
The STARTTLS implementation in Postfix 2.4.x prior to 2.4.16, 2.5.x prior to 2.5.12, 2.6.x prior to 2.6.9, and 2.7.x prior to 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle malicious users to insert commands into encrypted SMTP sessions by sending ...
Postfix Postfix 2.4
Postfix Postfix 2.4.4
Postfix Postfix 2.4.0
Postfix Postfix 2.4.9
Postfix Postfix 2.4.8
Postfix Postfix 2.4.6
Postfix Postfix 2.4.5
Postfix Postfix 2.4.14
Postfix Postfix 2.4.15
Postfix Postfix 2.4.3
Postfix Postfix 2.4.2
Postfix Postfix 2.4.10
Postfix Postfix 2.4.11
Postfix Postfix 2.4.1
Postfix Postfix 2.4.7
Postfix Postfix 2.4.12
Postfix Postfix 2.4.13
Postfix Postfix 2.5.0
Postfix Postfix 2.5.8
Postfix Postfix 2.5.9
Postfix Postfix 2.5.6
Postfix Postfix 2.5.7
NA
CVE-2011-1720
The SMTP server in Postfix prior to 2.5.13, 2.6.x prior to 2.6.10, 2.7.x prior to 2.7.4, and 2.8.x prior to 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote malicious user...
Postfix Postfix 2.3.16
Postfix Postfix 2.3.18
Postfix Postfix 2.0.10
Postfix Postfix 2.4.10
Postfix Postfix 2.5.0
Postfix Postfix 2.4
Postfix Postfix 2.3.11
Postfix Postfix 2.0.14
Postfix Postfix 2.0.17
Postfix Postfix 2.2.7
Postfix Postfix 2.0.16
Postfix Postfix 2.3.6
Postfix Postfix 2.1.5
Postfix Postfix 2.5.9
Postfix Postfix 2.3.0
Postfix Postfix 2.0.6
Postfix Postfix 2.2.4
Postfix Postfix 2.0.15
Postfix Postfix 2.5.2
Postfix Postfix 2.4.15
Postfix Postfix 2.5.12
Postfix Postfix 2.4.0
2 Nmap scripts
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started