Page 6 of 26 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 2

Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value. Vulnerabilidad de cadena de formato en daemon.c de Exim 4.x a 4.10, y 3.x a 3.36, permite a los usurios administradores de de exim ejecutar código arbitrario modificando el valor pid_file_path. • https://www.exploit-db.com/exploits/22066 http://groups.yahoo.com/group/exim-users/message/42358 http://marc.info/?l=bugtraq&m=103903403527788&w=2 http://marc.info/?l=bugtraq&m=104006219018664&w=2 http://www.exim.org/pipermail/exim-users/Week-of-Mon-20021202/046978.html http://www.securityfocus.com/bid/6314 https://exchange.xforce.ibmcloud.com/vulnerabilities/10761 •