Show filters
64 Total Results
Displaying 11-20 of 64
Sort by:
Attacker Value
Unknown

CVE-2023-42114

Disclosure Date: May 03, 2024 (last updated September 18, 2024)
Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to disclose information in the context of the service account. . Was ZDI-CAN-17433.
0
Attacker Value
Unknown

CVE-2023-51766

Disclosure Date: December 24, 2023 (last updated February 02, 2024)
Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
Attacker Value
Unknown

CVE-2022-4523

Disclosure Date: December 15, 2022 (last updated January 26, 2024)
A vulnerability, which was classified as problematic, has been found in vexim2. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 21c0a60d12e9d587f905cd084b2c70f9b1592065. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215903.
Attacker Value
Unknown

CVE-2022-3620

Disclosure Date: October 20, 2022 (last updated November 08, 2023)
A vulnerability was found in Exim and classified as problematic. This issue affects the function dmarc_dns_lookup of the file dmarc.c of the component DMARC Handler. The manipulation leads to use after free. The attack may be initiated remotely. The name of the patch is 12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211919.
Attacker Value
Unknown

CVE-2022-3559

Disclosure Date: October 17, 2022 (last updated November 08, 2023)
A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.
Attacker Value
Unknown

CVE-2021-38371

Disclosure Date: August 10, 2021 (last updated November 28, 2024)
The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
Attacker Value
Unknown

CVE-2020-28008

Disclosure Date: May 06, 2021 (last updated November 28, 2024)
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.
Attacker Value
Unknown

CVE-2020-28022

Disclosure Date: May 06, 2021 (last updated November 28, 2024)
Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.
Attacker Value
Unknown

CVE-2020-28010

Disclosure Date: May 06, 2021 (last updated November 28, 2024)
Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).
Attacker Value
Unknown

CVE-2020-28018

Disclosure Date: May 06, 2021 (last updated November 28, 2024)
Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL.