exim4 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the exim4 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Insufficient Verification of Data Authenticity

<4.92-8+deb10u9
  • L
CVE-2023-42117

*
  • L
CVE-2023-42116

<4.92-8+deb10u8
  • L
CVE-2023-42114

<4.92-8+deb10u8
  • L
CVE-2023-42119

*
  • L
Out-of-Bounds

*
  • C
Out-of-bounds Write

<4.92-8+deb10u7
  • L
Arbitrary Code Injection

*
  • C
Arbitrary Argument Injection

<4.92-8+deb10u6
  • C
Out-of-Bounds

<4.92-8+deb10u6
  • H
Out-of-bounds Read

<4.92-8+deb10u6
  • H
Out-of-bounds Read

<4.92-8+deb10u6
  • C
Out-of-Bounds

<4.92-8+deb10u6
  • H
CVE-2020-28021

<4.92-8+deb10u6
  • H
Improper Initialization

<4.92-8+deb10u6
  • C
Integer Overflow or Wraparound

<4.92~RC5-1
  • C
Use After Free

<4.92-8+deb10u6
  • C
Integer Overflow or Wraparound

<4.92-8+deb10u6
  • H
CVE-2020-28015

<4.92-8+deb10u6
  • M
CVE-2020-28014

<4.92-8+deb10u6
  • H
Out-of-bounds Write

<4.92-8+deb10u6
  • H
Exposure of Resource to Wrong Sphere

<4.92-8+deb10u6
  • H
Out-of-bounds Write

<4.92-8+deb10u6
  • H
Integer Overflow or Wraparound

<4.92-8+deb10u6
  • H
Out-of-bounds Write

<4.92-8+deb10u6
  • H
Improper Privilege Management

<4.92-8+deb10u6
  • H
Link Following

<4.92-8+deb10u6
  • H
Out-of-bounds Read

<4.92-8+deb10u4
  • C
Buffer Overflow

<4.92-8+deb10u3
  • C
CVE-2019-15846

<4.92-8+deb10u2
  • C
Improper Data Handling

<4.92-8+deb10u1
  • C
Improper Input Validation

<4.92~RC3-1
  • C
Out-of-Bounds

<4.90.1-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.89-13
  • C
Use After Free

<4.89-12
  • M
Improper Resource Shutdown or Release

<4.89-3
  • M
Key Management Errors

<4.88~RC6-2
  • H
Access Restriction Bypass

<4.86.2-1
  • L
Numeric Errors

<4.82.1-2
  • L
Improper Input Validation

<4.82.1-1
  • M
Out-of-Bounds

<4.80-5.1
  • H
Use of Externally-Controlled Format String

<4.75-3
  • H
Improper Input Validation

<4.76-1
  • H
Improper Input Validation

<4.72-4
  • C
Out-of-Bounds

<4.70-1
  • H
Access Restriction Bypass

<4.72-3
  • L
Race Condition

<4.72-1
  • L
Race Condition

<4.72-1
  • M
CVE-2005-0022

<4.34-10
  • H
CVE-2005-0021

<4.34-10
  • H
CVE-2004-0399

<4.33-1
  • H
CVE-2004-0400

<4.33-1
  • H
CVE-2002-1381

<4.11-0.0.1