Page 6 of 35 results (0.012 seconds)

CVSS: 7.5EPSS: 0%CPEs: 11EXPL: 1

Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c. Exim versiones hasta 4.93, presenta una lectura fuera de límites en el autenticador SPA lo que podría resultar en una omisión de la autenticación SPA/NTLM en los archivos auths/spa.c y auths/auth-spa.c. • http://www.openwall.com/lists/oss-security/2021/05/04/7 https://bugs.exim.org/show_bug.cgi?id=2571 https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86 https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0 https://lists.debian.org/debian-lts-announce/2020/05/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6IQQ2SERFUD4WMRSX6XYDNK7Q4GPT7Y https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora • CWE-125: Out-of-bounds Read •

CVSS: 8.4EPSS: 0%CPEs: 2EXPL: 1

A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1. Una vulnerabilidad de seguimiento de enlace simbólico (Symlink) de UNIX en el empaquetado de exim en openSUSE Factory, permite a atacantes locales escalar desde un correo de usuario a root. Este problema afecta: exim de openSUSE Factory versiones anteriores a 4.93.0.4-3.1. • http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00010.html https://bugzilla.suse.com/show_bug.cgi?id=1154183 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 10.0EPSS: 25%CPEs: 4EXPL: 1

Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash. Exim versiones anteriores a 4.92.2, permite a atacantes remotos ejecutar código arbitrario como root por medio de una barra invertida al final de una URL. • https://github.com/synacktiv/Exim-CVE-2019-15846 http://exim.org/static/doc/security/CVE-2019-15846.txt http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html http://www.openwall.com/lists/oss-security/2019/09/06/2 http://www.openwall.com/lists/oss-security/2019/09/06/4 http://www.openwall.com/lists/oss-security/2019/09/06/5 http://www.openwall.com/lists/oss-security/2019/09/06/6 http://www.openwall.com/lists/oss-security/2019/09/ •

CVSS: 10.0EPSS: 7%CPEs: 3EXPL: 0

Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain). Exim versiones 4.85 hasta 4.92 (corregido en 4.92.1) permite la ejecución de código remota como root en algunas configuraciones inusuales que usan la expansión ${sort} para elementos que pueden ser controlados por un atacante (por ejemplo, $local_part o $domain). • http://exim.org/static/doc/security/CVE-2019-13917.txt http://www.openwall.com/lists/oss-security/2019/07/26/5 https://seclists.org/bugtraq/2019/Jul/51 https://security.gentoo.org/glsa/201909-06 https://www.debian.org/security/2019/dsa-4488 • CWE-19: Data Processing Errors •

CVSS: 10.0EPSS: 97%CPEs: 4EXPL: 17

A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution. Se descubrió un defecto Exim versiones 4.87 a la 4.91 (incluida). Una validación incorrecta de la dirección del recipiente en la función deliver_message() en /src/deliver.c puede llevar a ejecutar comandos remotos Exim versions 4.87 through 4.91 suffer from a local privilege escalation vulnerability. Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution. • https://www.exploit-db.com/exploits/46996 https://www.exploit-db.com/exploits/47307 https://www.exploit-db.com/exploits/46974 https://github.com/cowbe0x004/eximrce-CVE-2019-10149 https://github.com/Diefunction/CVE-2019-10149 https://github.com/AzizMea/CVE-2019-10149-privilege-escalation https://github.com/darsigovrustam/CVE-2019-10149 https://github.com/aishee/CVE-2019-10149-quick https://github.com/hyim0810/CVE-2019-10149 https://github.com/Stick-U235/CVE-2019-10149-Exploit& • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •