Описание
Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.88-5ubuntu1 |
| esm-infra-legacy/trusty | released | 4.82-3ubuntu2.2 |
| esm-infra/xenial | released | 4.86.2-2ubuntu2.1 |
| precise | released | 4.76-3ubuntu3.4 |
| trusty | released | 4.82-3ubuntu2.2 |
| trusty/esm | released | 4.82-3ubuntu2.2 |
| upstream | released | 4.87.1,4.88 |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE | |
| xenial | released | 4.86.2-2ubuntu2.1 |
Показывать по
EPSS
2.6 Low
CVSS2
5.9 Medium
CVSS3
Связанные уязвимости
Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.
Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.
Exim before 4.87.1 might allow remote attackers to obtain the private ...
Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.
EPSS
2.6 Low
CVSS2
5.9 Medium
CVSS3