Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 18 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 17 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sagredo
Sagredo qmail |
|
| Vendors & Products |
Sagredo
Sagredo qmail |
Fri, 17 Apr 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | TLS_QUIT Command Injection in sagredo qmail |
Thu, 16 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | sagredo qmail before 2026.04.07 allows tls_quit remote code execution because of popen in notlshosts_auto in qmail-remote.c. | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-18T20:09:47.901Z
Reserved: 2026-04-16T22:02:09.837Z
Link: CVE-2026-41113
Updated: 2026-04-18T20:09:47.901Z
Status : Awaiting Analysis
Published: 2026-04-16T22:16:39.103
Modified: 2026-04-18T21:16:09.427
Link: CVE-2026-41113
No data.
OpenCVE Enrichment
Updated: 2026-04-17T08:01:25Z