Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
exim exim - vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1251
Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote malicious users to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm...
Sa-exim Sa-exim 4.0
Sa-exim Sa-exim 4.1
Sa-exim Sa-exim 4.2
4
CVSSv3
CVE-2017-1000369
Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows malicious users to cause arbitrary code execution. This affects exim version 4.89 and previous versions. Pleas...
Exim Exim
Exim Exim 4.88
Exim Exim 4.89
Debian Debian Linux 8.0
Debian Debian Linux 9.0
9.8
CVSSv3
CVE-2017-16943
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote malicious users to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.
Exim Exim 4.89
Exim Exim 4.88
Debian Debian Linux 9.0
2 Github repositories
7.5
CVSSv3
CVE-2017-16944
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote malicious users to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the en...
Exim Exim 4.88
Exim Exim 4.89
Debian Debian Linux 9.0
1 EDB exploit
1 Github repository
1 Article
NA
CVE-2003-0743
Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) prior to 3.36 and Exim 4 (exim4) prior to 4.21 may allow remote malicious users to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newli...
University Of Cambridge Exim 3.15
University Of Cambridge Exim 3.16
University Of Cambridge Exim 3.3.1
University Of Cambridge Exim 3.3.2
University Of Cambridge Exim 3.36
University Of Cambridge Exim 4.10
University Of Cambridge Exim 3.11
University Of Cambridge Exim 3.12
University Of Cambridge Exim 3.19
University Of Cambridge Exim 3.20
University Of Cambridge Exim 3.32
University Of Cambridge Exim 3.33
University Of Cambridge Exim 3.0
University Of Cambridge Exim 3.17
University Of Cambridge Exim 3.18
University Of Cambridge Exim 3.30
University Of Cambridge Exim 3.31
University Of Cambridge Exim 4.20
University Of Cambridge Exim 3.13
University Of Cambridge Exim 3.14
University Of Cambridge Exim 3.21
University Of Cambridge Exim 3.22
7.5
CVSSv3
CVE-2021-38371
The STARTTLS feature in Exim up to and including 4.94.2 allows response injection (buffering) during MTA SMTP sending.
Exim Exim
7.8
CVSSv3
CVE-2020-28016
Exim 4 prior to 4.94.2 allows an off-by-two Out-of-bounds Write because "-F ''" is mishandled by parse_fix_phrase.
Exim Exim
8.8
CVSSv3
CVE-2020-28021
Exim 4 prior to 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.
Exim Exim
7.8
CVSSv3
CVE-2020-28007
Exim 4 prior to 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
Exim Exim
7.8
CVSSv3
CVE-2020-28008
Exim 4 prior to 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to c...
Exim Exim
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »