CVE-2026-45185
- EPSS 0.05%
- Veröffentlicht 12.05.2026 00:00:00
- Zuletzt bearbeitet 13.05.2026 15:52:25
Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byt...
CVE-2026-40687
- EPSS 0.11%
- Veröffentlicht 30.04.2026 00:00:00
- Zuletzt bearbeitet 01.05.2026 19:17:51
In Exim before 4.99.2, when the SPA authentication driver is used with an adversarial SPA resource, there can be an out-of-bounds write that crashes the connection instance, or erroneous data processing that divulges data from uninitialized heap memo...
CVE-2026-40686
- EPSS 0.07%
- Veröffentlicht 30.04.2026 00:00:00
- Zuletzt bearbeitet 01.05.2026 17:44:15
In Exim before 4.99.2, when utf8 operators are enabled, there is an out-of-bounds read if large UTF-8 trailing characters are present (malformed UTF-8 header data). Information might be divulged within an error message produced during handling of an ...
CVE-2026-40685
- EPSS 0.1%
- Veröffentlicht 30.04.2026 00:00:00
- Zuletzt bearbeitet 01.05.2026 17:51:06
In Exim before 4.99.2, when JSON lookup is enabled, an out-of-bounds heap write can occur when a JSON operator encounters malformed JSON in an untrusted header, because of an incorrect implementation of \ skipping.
CVE-2026-40684
- EPSS 0.1%
- Veröffentlicht 30.04.2026 00:00:00
- Zuletzt bearbeitet 01.05.2026 18:16:15
In Exim before 4.99.2, on systems using musl libc (not glibc), an attacker can crash the connection instance when malformed DNS data is present in PTR records. This is caused by a dn_expand oddity in octal printing.
CVE-2025-67896
- EPSS 0.05%
- Veröffentlicht 14.12.2025 04:00:24
- Zuletzt bearbeitet 22.12.2025 19:15:45
Exim before 4.99.1, with certain non-default rate-limit configurations, allows a remote heap-based buffer overflow because database records are cast directly to internal structures without validation.
CVE-2025-30232
- EPSS 0.1%
- Veröffentlicht 27.03.2025 00:00:00
- Zuletzt bearbeitet 30.09.2025 21:52:55
A use-after-free in Exim 4.96 through 4.98.1 could allow users (with command-line access) to escalate privileges.
CVE-2025-26794
- EPSS 76.22%
- Veröffentlicht 21.02.2025 13:15:11
- Zuletzt bearbeitet 18.12.2025 19:16:22
Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection. (Resolving SQL injection requires an update to 4.99.1 in certain non-default rate-limit configurations.)
CVE-2024-39929
- EPSS 60.31%
- Veröffentlicht 04.07.2024 15:15:10
- Zuletzt bearbeitet 10.07.2025 22:15:25
Exim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users.
CVE-2023-42119
- EPSS 0.73%
- Veröffentlicht 03.05.2024 03:15:50
- Zuletzt bearbeitet 03.11.2025 22:16:26
Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability...