Описание
Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2002-1381
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10761
- http://groups.yahoo.com/group/exim-users/message/42358
- http://marc.info/?l=bugtraq&m=103903403527788&w=2
- http://marc.info/?l=bugtraq&m=104006219018664&w=2
- http://www.exim.org/pipermail/exim-users/Week-of-Mon-20021202/046978.html
- http://www.securityfocus.com/bid/6314
EPSS
Процентиль: 86%
0.03052
Низкий
CVE ID
Связанные уязвимости
nvd
больше 22 лет назад
Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
debian
больше 22 лет назад
Format string vulnerability in daemon.c for Exim 4.x through 4.10, and ...
EPSS
Процентиль: 86%
0.03052
Низкий