Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.11852
Categoría:SMTP problems
Título:Mail relaying (thorough test)
Resumen:The remote SMTP server appears to be insufficiently protected; against mail relaying.
Descripción:Summary:
The remote SMTP server appears to be insufficiently protected
against mail relaying.

Vulnerability Impact:
This means that spammers might be able to use your mail server to
send their mails to the world.

Solution:
Upgrade your software or improve the configuration so that your
SMTP server cannot be used as a relay any more.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-1999-0512
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0512
Common Vulnerability Exposure (CVE) ID: CVE-2002-1278
BugTraq ID: 6118
http://www.securityfocus.com/bid/6118
Conectiva Linux advisory: CLA-2002:544
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000544
http://www.osvdb.org/6066
http://www.iss.net/security_center/static/10554.php
Common Vulnerability Exposure (CVE) ID: CVE-2003-0285
BugTraq ID: 7580
http://www.securityfocus.com/bid/7580
Bugtraq: 20030513 AIX sendmail open relay (Google Search)
http://marc.info/?l=bugtraq&m=105284689228961&w=2
CERT/CC vulnerability note: VU#814617
http://www.kb.cert.org/vuls/id/814617
http://security.sdsc.edu/advisories/2003.05.13-AIX-sendmail.txt
XForce ISS Database: aix-sendmail-mail-relay(11993)
https://exchange.xforce.ibmcloud.com/vulnerabilities/11993
Common Vulnerability Exposure (CVE) ID: CVE-2003-0316
Bugtraq: 20030516 Venturi Client 2.1 confirmed as open relay [Verizon Wireless Mobile Office] (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2003-05/0188.html
http://www.venturiwireless.com/tech_support/Q_and_A/Q_A_09.htm
Common Vulnerability Exposure (CVE) ID: CVE-2005-0431
Bugtraq: 20050210 Barracuda Spam Firewall <= 3.1.10 acts as open relay for whitelisted senders. (Google Search)
http://marc.info/?l=bugtraq&m=110805534732492&w=2
http://secunia.com/advisories/14243
XForce ISS Database: barracuda-open-relay(19283)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19283
Common Vulnerability Exposure (CVE) ID: CVE-2005-2857
http://k.domaindlx.com/shellcore/advisories.asp?bug_report=display&infamous_group=87
http://secunia.com/advisories/16698
Common Vulnerability Exposure (CVE) ID: CVE-2006-0977
BugTraq ID: 16840
http://www.securityfocus.com/bid/16840
Bugtraq: 20060225 Mail Transport System Professional--Open Relay Hole (Google Search)
http://www.securityfocus.com/archive/1/426181/100/0/threaded
http://secunia.com/advisories/19067
http://www.vupen.com/english/advisories/2006/0786
XForce ISS Database: mts-mail-relay(24985)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24985
Common Vulnerability Exposure (CVE) ID: CVE-2019-14403
CopyrightCopyright (C) 2003 Michel Arboi

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.