Filtered by vendor University Of Cambridge
Subscriptions
Filtered by product Exim
Subscriptions
Total
10 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2001-0889 | 2 Redhat, University Of Cambridge | 3 Linux, Powertools, Exim | 2024-08-08 | N/A |
Exim 3.22 and earlier, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote attackers to execute arbitrary commands via shell metacharacters. | ||||
CVE-2001-0690 | 4 Conectiva, Debian, Redhat and 1 more | 5 Linux, Debian Linux, Linux and 2 more | 2024-08-08 | N/A |
Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers. | ||||
CVE-2002-1381 | 1 University Of Cambridge | 1 Exim | 2024-08-08 | N/A |
Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value. | ||||
CVE-2002-0274 | 1 University Of Cambridge | 1 Exim | 2024-08-08 | N/A |
Exim 3.34 and earlier may allow local users to gain privileges via a buffer overflow in long -C (configuration file) and other command line arguments. | ||||
CVE-2003-0743 | 1 University Of Cambridge | 1 Exim | 2024-08-08 | N/A |
Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer. | ||||
CVE-2004-0400 | 1 University Of Cambridge | 1 Exim | 2024-08-08 | N/A |
Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check. | ||||
CVE-2004-0399 | 1 University Of Cambridge | 1 Exim | 2024-08-08 | N/A |
Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification. | ||||
CVE-2005-0021 | 2 Redhat, University Of Cambridge | 2 Enterprise Linux, Exim | 2024-08-07 | N/A |
Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function. | ||||
CVE-2005-0022 | 2 Redhat, University Of Cambridge | 2 Enterprise Linux, Exim | 2024-08-07 | N/A |
Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication. | ||||
CVE-1999-0971 | 1 University Of Cambridge | 1 Exim | 2024-08-01 | N/A |
Buffer overflow in Exim allows local users to gain root privileges via a long :include: option in a .forward file. |
Page 1 of 1.