Search Results (Refine Search)
- Keyword (text search): cpe:2.3:a:exim:exim:4.94.2:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-51766 |
Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not. Published: December 24, 2023; 1:15:07 AM -0500 |
V3.1: 5.3 MEDIUM V2.0:(not available) |
CVE-2022-37452 |
Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set. Published: August 07, 2022; 2:15:08 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2022-37451 |
Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc. Published: August 06, 2022; 2:15:08 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-38371 |
The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending. Published: August 10, 2021; 11:15:08 AM -0400 |
V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |