Show filters
70 Total Results
Displaying 41-50 of 70
Sort by:
Attacker Value
Unknown
CVE-2019-16928
Disclosure Date: September 27, 2019 (last updated November 08, 2023)
Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.
0
Attacker Value
Unknown
CVE-2019-15846
Disclosure Date: September 06, 2019 (last updated October 06, 2023)
Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.
0
Attacker Value
Unknown
CVE-2019-13917
Disclosure Date: July 25, 2019 (last updated November 27, 2024)
Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).
0
Attacker Value
Unknown
CVE-2019-10149
Disclosure Date: June 05, 2019 (last updated November 27, 2024)
A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
0
Attacker Value
Unknown
CVE-2017-16944
Disclosure Date: November 25, 2017 (last updated November 26, 2024)
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function.
0
Attacker Value
Unknown
CVE-2017-16943
Disclosure Date: November 25, 2017 (last updated November 26, 2024)
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.
0
Attacker Value
Unknown
CVE-2017-1000369
Disclosure Date: June 19, 2017 (last updated November 26, 2024)
Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time.
0
Attacker Value
Unknown
CVE-2016-9963
Disclosure Date: February 01, 2017 (last updated November 25, 2024)
Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.
0
Attacker Value
Unknown
CVE-2016-1531
Disclosure Date: April 07, 2016 (last updated November 25, 2024)
Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
0
Attacker Value
Unknown
CVE-2014-2957
Disclosure Date: September 04, 2014 (last updated October 05, 2023)
The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function.
0