| CVE-2019-16928 |
AVG-1038 |
Critical |
Yes |
Arbitrary code execution |
It has been discovered that Exim before 4.92.3 is vulnerable to a heap-based buffer overflow in string_vformat (string.c) involving a long EHLO command... |
| CVE-2019-15846 |
AVG-1037 |
Critical |
Yes |
Arbitrary command execution |
Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash. |
| CVE-2019-13917 |
AVG-1011 |
Critical |
Yes |
Arbitrary code execution |
Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that... |
| CVE-2019-10149 |
AVG-982 |
Critical |
Yes |
Arbitrary code execution |
A flaw was found in the way exim validated recipient addresses. A remote attacker could use this flaw to execute arbitrary commands on the exim server with... |
| CVE-2018-6789 |
AVG-608 |
High |
Yes |
Arbitrary code execution |
An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen.... |
| CVE-2017-1000369 |
AVG-518 |
Medium |
No |
Denial of service |
An uncontrolled resource consumption flaw has been discovered in Exim before 4.89.1. The use of multiple "-p" command line arguments which are malloc()'ed... |
| CVE-2017-16944 |
AVG-518 |
High |
Yes |
Denial of service |
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack... |
| CVE-2017-16943 |
AVG-518 |
Critical |
Yes |
Arbitrary code execution |
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of... |
| CVE-2017-10140 |
AVG-518 |
Medium |
No |
Information disclosure |
It was found that Berkeley DB reads the DB_CONFIG configuration file from the current working directory by default. This happens when calling db_create()... |
| CVE-2016-9963 |
AVG-153 |
Medium |
Yes |
Information disclosure |
It was found that Exim leaked DKIM signing private keys to the "mainlog" log file. As a result, an attacker with access to system log files could... |