Описание
Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
Ссылки
- ExploitPatchVendor Advisory
- ExploitPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:university_of_cambridge:exim:3.35:*:*:*:*:*:*:*
cpe:2.3:a:university_of_cambridge:exim:3.36:*:*:*:*:*:*:*
cpe:2.3:a:university_of_cambridge:exim:4.10:*:*:*:*:*:*:*
EPSS
Процентиль: 86%
0.03052
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
больше 22 лет назад
Format string vulnerability in daemon.c for Exim 4.x through 4.10, and ...
github
больше 3 лет назад
Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
EPSS
Процентиль: 86%
0.03052
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other