Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
exim exim vulnerabilities and exploits
(subscribe to this query)
725
VMScore
CVE-2002-1381
Format string vulnerability in daemon.c for Exim 4.x up to and including 4.10, and 3.x up to and including 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
University Of Cambridge Exim 3.35
University Of Cambridge Exim 3.36
University Of Cambridge Exim 4.10
1 EDB exploit
409
VMScore
CVE-2002-0274
Exim 3.34 and previous versions may allow local users to gain privileges via a buffer overflow in long -C (configuration file) and other command line arguments.
University Of Cambridge Exim
668
VMScore
CVE-2001-0889
Exim 3.22 and previous versions, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote malicious users to execute arbitrary commands via shell metacharacters.
University Of Cambridge Exim
Redhat Linux
755
VMScore
CVE-2001-0690
Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote malicious user to execute arbitrary code via format strings in SMTP mail headers.
Conectiva Linux
University Of Cambridge Exim
Redhat Linux
Debian Debian Linux 4.0
1 EDB exploit
725
VMScore
CVE-1999-0971
Buffer overflow in Exim allows local users to gain root privileges via a long :include: option in a .forward file.
University Of Cambridge Exim
1 EDB exploit
641
VMScore
CVE-1999-0145
Sendmail WIZ command enabled, allowing root access.
Eric Allman Sendmail
1000
VMScore
CVE-1999-0095
The debug command in Sendmail is enabled, allowing malicious users to execute commands as root.
Eric Allman Sendmail 5.58
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10