[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:1601051
Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.

oval:org.secpod.oval:def:117065
Exim is a message transfer agent developed at the University of Cambridge for use on Unix systems connected to the Internet. It is freely available under the terms of the GNU General Public Licence. In style it is similar to Smail 3, but its facilities are more general. There is a great deal of fle ...

oval:org.secpod.oval:def:117061
Exim is a message transfer agent developed at the University of Cambridge for use on Unix systems connected to the Internet. It is freely available under the terms of the GNU General Public Licence. In style it is similar to Smail 3, but its facilities are more general. There is a great deal of fle ...

oval:org.secpod.oval:def:69905
Zerons and Qualys discovered that a buffer overflow triggerable in the TLS negotiation code of the Exim mail transport agent could result in the execution of arbitrary code with root privileges.

oval:org.secpod.oval:def:705164
exim4: Exim is a mail transport agent Exim could be made to run programs as an administrator if it received specially crafted network traffic.

oval:org.secpod.oval:def:604523
quot;Zeronsquot; and Qualys discovered that a buffer overflow triggerable in the TLS negotiation code of the Exim mail transport agent could result in the execution of arbitrary code with root privileges.

oval:org.secpod.oval:def:58414
Meh Chang discovered a buffer overflow flaw in a utility function used in the SMTP listener of Exim, a mail transport agent. A remote attacker can take advantage of this flaw to cause a denial of service, or potentially the execution of arbitrary code via a specially crafted message.

oval:org.secpod.oval:def:58872
exim4: Exim is a mail transport agent Exim could be made to run programs as an administrator if it received specially crafted network traffic.

oval:org.secpod.oval:def:58845
"Zerons" and Qualys discovered that a buffer overflow triggerable in the TLS negotiation code of the Exim mail transport agent could result in the execution of arbitrary code with root privileges.

CPE    3
cpe:/o:debian:debian_linux:9.0
cpe:/a:exim:exim
cpe:/o:debian:debian_linux:8.0
*CVE
CVE-2019-15846

© SecPod Technologies