exim/exim vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://github.com|exim/exim package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Input Validation

[,4.98-RC3)
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

[0,)
  • L
Out-of-bounds Read

[0,)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[0,)
  • H
Improper Neutralization of Special Elements used in a Command ('Command Injection')

[0,)
  • L
Out-of-bounds Read

[0,)
  • C
Remote Code Execution (RCE)

[,4.96.1)
  • M
Out-of-Bounds

[0,)
  • H
Use After Free

[4.87,)
  • M
Heap-based Buffer Overflow

[,4.95)
  • M
Release of Invalid Pointer or Reference

[,4.96)
  • C
Out-of-Bounds

[4.00,4.94.2)
  • M
Out-of-Bounds

[0,4.80.1)
  • H
Access Restriction Bypass

[,4.73)
  • M
Race Condition

[,4.72)
  • C
Buffer Overflow

[4.92,4.93)
  • C
Improper Data Handling

[4.85,4.92.1)
  • H
Out-of-bounds Read

[4.00,4.94.2)
  • H
Improper Initialization

[4.88,4.94.2)
  • H
Improper Input Validation

[,4.73)
  • M
Improper Input Validation

[,4.82.1)
  • C
Out-of-Bounds

[,4.90.1)
  • M
Race Condition

[,4.72)
  • C
Integer Overflow or Wraparound

[4.00,4.92)
  • H
Information Exposure

[4.00,4.94.2)
  • M
Privilege Escalation

[,4.94.2)
  • H
Out-of-Bounds

[,4.70)
  • H
Use of Externally-Controlled Format String

[,4.76)
  • M
Denial of Service (DoS)

[4.00,4.94.2)
  • H
Arbitrary Code Execution

[4.00,4.94.2)
  • H
Out-of-bounds Write

[4.00,4.94.2)
  • H
Integer Overflow or Wraparound

[4.00,4.94.2)
  • C
Argument Injection

[4.00,4.94.2)
  • C
Use After Free

[4.90,4.94.2)
  • H
Arbitrary Code Injection

[0,)
  • C
Out-of-Bounds

[4.00,4.94.2)
  • H
Improper Input Validation

[4.00,4.94.2)
  • H
Symlink Attack

[,4.93.0.4-3.1)
  • H
Improper Input Validation

[0,4.76)
  • C
Use After Free

[4.88,4.89]
  • M
Key Management Errors

[,4.87.1)
  • H
Denial of Service (DoS)

[4.88,4.89]
  • H
Symlink Attack

[4.00,4.94.2)
  • C
Integer Overflow or Wraparound

[,4.94.2)
  • H
Out-of-bounds Read

[,4.94.1)
  • M
Access Restriction Bypass

[,4.89.1)
  • H
Out-of-bounds Read

[4.00,4.94.2)
  • C
Arbitrary Code Execution

[,4.92.2)
  • H
Privilege Escalation

[4.00,4.94.2)
  • H
Access Restriction Bypass

[,4.86.1)
  • C
Command Injection

[4.87,4.92)
  • M
Denial of Service (DoS)

[,4.84.2)
  • H
Out-of-bounds Write

[4.00,4.94.2)
  • H
Out-of-bounds Write

[4.00,4.94.2)
  • H
Out-of-bounds Write

[4.00,4.94.2)