Vulnerabilities > Exim
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-09-06 | CVE-2019-15846 | Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash. | 9.8 |
2019-07-25 | CVE-2019-13917 | Data Processing Errors vulnerability in multiple products Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain). | 9.8 |
2019-06-05 | CVE-2019-10149 | OS Command Injection vulnerability in multiple products A flaw was found in Exim versions 4.87 to 4.91 (inclusive). | 9.8 |
2018-02-08 | CVE-2018-6789 | Classic Buffer Overflow vulnerability in multiple products An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. | 9.8 |
2017-11-25 | CVE-2017-16944 | Infinite Loop vulnerability in multiple products The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function. | 7.5 |
2017-11-25 | CVE-2017-16943 | Use After Free vulnerability in multiple products The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands. | 9.8 |
2017-06-19 | CVE-2017-1000369 | Improper Resource Shutdown or Release vulnerability in multiple products Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. | 4.0 |
2017-02-01 | CVE-2016-9963 | Key Management Errors vulnerability in multiple products Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages. | 5.9 |
2016-04-07 | CVE-2016-1531 | Permissions, Privileges, and Access Controls vulnerability in Exim Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument. | 7.0 |
2010-12-14 | CVE-2010-4345 | Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive. | 7.8 |