Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
exim vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1251
Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote malicious users to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm...
Sa-exim Sa-exim 4.0
Sa-exim Sa-exim 4.1
Sa-exim Sa-exim 4.2
4
CVSSv3
CVE-2017-1000369
Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows malicious users to cause arbitrary code execution. This affects exim version 4.89 and previous versions. Pleas...
Exim Exim
Exim Exim 4.88
Exim Exim 4.89
Debian Debian Linux 8.0
Debian Debian Linux 9.0
9.8
CVSSv3
CVE-2017-16943
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote malicious users to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.
Exim Exim 4.89
Exim Exim 4.88
Debian Debian Linux 9.0
2 Github repositories
7.5
CVSSv3
CVE-2017-16944
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote malicious users to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the en...
Exim Exim 4.88
Exim Exim 4.89
Debian Debian Linux 9.0
1 EDB exploit
1 Github repository
1 Article
NA
CVE-2003-0743
Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) prior to 3.36 and Exim 4 (exim4) prior to 4.21 may allow remote malicious users to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newli...
University Of Cambridge Exim 3.15
University Of Cambridge Exim 3.16
University Of Cambridge Exim 3.3.1
University Of Cambridge Exim 3.3.2
University Of Cambridge Exim 3.36
University Of Cambridge Exim 4.10
University Of Cambridge Exim 3.11
University Of Cambridge Exim 3.12
University Of Cambridge Exim 3.19
University Of Cambridge Exim 3.20
University Of Cambridge Exim 3.32
University Of Cambridge Exim 3.33
University Of Cambridge Exim 3.0
University Of Cambridge Exim 3.17
University Of Cambridge Exim 3.18
University Of Cambridge Exim 3.30
University Of Cambridge Exim 3.31
University Of Cambridge Exim 4.20
University Of Cambridge Exim 3.13
University Of Cambridge Exim 3.14
University Of Cambridge Exim 3.21
University Of Cambridge Exim 3.22
7.8
CVSSv3
CVE-2020-28008
Exim 4 prior to 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to c...
Exim Exim
6.1
CVSSv3
CVE-2020-28014
Exim 4 prior to 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten.
Exim Exim
6.3
CVSSv3
CVE-2021-27216
Exim 4 prior to 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options.
Exim Exim
7.8
CVSSv3
CVE-2020-8015
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local malicious users to escalate from user mail to root. This issue affects: openSUSE Factory exim versions before 4.93.0.4-3.1.
Exim Exim
7
CVSSv3
CVE-2016-1531
Exim prior to 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
Exim Exim
3 EDB exploits
6 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
firmware
CVE-2023-52866
CVE-2024-4367
CVE-2024-1721
CVE-2023-34992
XML injection
CVE-2023-52817
SQL
CVE-2023-52855
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »