Логотип exploitDog
bind:"BDU:2023-06274" OR bind:"CVE-2023-42117"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-06274" OR bind:"CVE-2023-42117"

Количество 10

Количество 10

fstec логотип

BDU:2023-06274

около 3 лет назад

Уязвимость службы smtp почтового сервера Exim, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
EPSS: Низкий
redos логотип

ROS-20240404-17

около 1 года назад

Множественные уязвимости exim

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2023-42117

около 1 года назад

Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17554.

CVSS3: 8.1
EPSS: Низкий
redhat логотип

CVE-2023-42117

больше 1 года назад

Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17554.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2023-42117

около 1 года назад

Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17554.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2023-42117

около 1 года назад

Exim Improper Neutralization of Special Elements Remote Code Execution ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-qf54-2qx8-3vcv

около 1 года назад

Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17554.

CVSS3: 8.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2023:0304-1

больше 1 года назад

Security update for exim

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2023:0303-1

больше 1 года назад

Security update for exim

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2024:0007-1

больше 1 года назад

Security update for exim

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-06274

Уязвимость службы smtp почтового сервера Exim, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
9%
Низкий
около 3 лет назад
redos логотип
ROS-20240404-17

Множественные уязвимости exim

CVSS3: 9.8
около 1 года назад
ubuntu логотип
CVE-2023-42117

Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17554.

CVSS3: 8.1
9%
Низкий
около 1 года назад
redhat логотип
CVE-2023-42117

Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17554.

CVSS3: 8.1
9%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-42117

Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17554.

CVSS3: 8.1
9%
Низкий
около 1 года назад
debian логотип
CVE-2023-42117

Exim Improper Neutralization of Special Elements Remote Code Execution ...

CVSS3: 8.1
9%
Низкий
около 1 года назад
github логотип
GHSA-qf54-2qx8-3vcv

Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17554.

CVSS3: 8.1
9%
Низкий
около 1 года назад
suse-cvrf логотип
openSUSE-SU-2023:0304-1

Security update for exim

больше 1 года назад
suse-cvrf логотип
openSUSE-SU-2023:0303-1

Security update for exim

больше 1 года назад
suse-cvrf логотип
openSUSE-SU-2024:0007-1

Security update for exim

больше 1 года назад

Уязвимостей на страницу