Odin HomeODIN logoODIN logo
PricingJoin us on Discord
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

182.160.128.171

SummaryCVE DetailsRaw Data
18 Jun 2025, 11:20:56 UTC
{
  "scan_id": 1750239192,
  "ip": "182.160.128.171",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.160.128.0/18",
    "postal_code": "2765",
    "coordinates": {
      "latitude": "-33.6087",
      "longitude": "150.8905"
    },
    "geo_point": "-33.6087, 150.8905",
    "locale_code": "en",
    "continent": "Oceania",
    "country_code": "AU",
    "country_name": "Australia",
    "city": "Bungarribee"
  },
  "location_updated_at": "2025-06-16T16:41:45Z",
  "asn": {
    "number": "AS55803",
    "organization": "Hostopia Australia Web Pty Ltd",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.160.128.0/18",
    "organization": "Hostopia Australia Pty Ltd",
    "descr": "Hostopia Australia Pty Ltd",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T11:27:16Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-06-16T16:41:45Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-06-16T20:58:39Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-06-16T16:41:45Z"
    }
  ],
  "hostnames": [
    {
      "name": "182.160.128.171-static.reverse.crucialx.net",
      "last_updated_at": "2025-06-18T12:26:50.590309876Z"
    }
  ],
  "services": [
    {
      "port": 22,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-01T06:09:28.111Z"
    },
    {
      "port": 25,
      "protocol": "tcp",
      "name": "smtp",
      "version": "4.63",
      "product": "Exim smtpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:exim:exim:4.63",
          "part": "a",
          "vendor": "exim",
          "product": "exim",
          "version": "4\\.63",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "smtp": {
          "banner": "220 loggermonitor.com ESMTP Exim 4.63 Sun, 08 Jun 2025 03:42:33 +0000\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_key_id": "keyid7719d4199441621defc6eab62bd6e6d9e4219d9b\ndirname/c=--/st=somestate/l=somecity/o=someorganization/ou=someorganizationalunit/cn=loggermonitor.com/[email protected]\nserial83dcccedffb7afaa",
              "basic_constraints": {
                "is_ca": true
              },
              "subject_key_id": "7719d4199441621defc6eab62bd6e6d9e4219d9b"
            },
            "fingerprint_md5": "A345C01256215E0FC3AF7105FE2DE2FF",
            "fingerprint_sha1": "1F69D48CE68C36552F7C62490B46C5DB56376087",
            "fingerprint_sha256": "9AEB4183DDFA4414F2A2B73FBA8CF4085BA07E57624E7BD6FD7FD828EE5467CD",
            "issuer": {
              "common_name": [
                "loggermonitor.com"
              ],
              "country": [
                "--"
              ],
              "email_address": [
                "[email protected]"
              ],
              "locality": [
                "SomeCity"
              ],
              "organization": [
                "SomeOrganization"
              ],
              "organizational_unit": [
                "SomeOrganizationalUnit"
              ],
              "province": [
                "SomeState"
              ]
            },
            "issuer_dn": "/C=--/ST=SomeState/L=SomeCity/O=SomeOrganization/OU=SomeOrganizationalUnit/CN=loggermonitor.com/[email protected]",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "9501694636414447530",
            "signature": {
              "algorithm": {
                "name": "SHA1-RSA",
                "oid": "1.2.840.113549.1.1.5"
              },
              "self_signed": true,
              "value": "NzMyNTIwY2U4NzJiMjRlYjE2ZDVjOTNlY2U0MWZjYzFjMjM3YjlkZWUzMjMzMzJiZWNiMWRmOGVhYzQ3NWQyZjE5YWM1ZjVkMmFlN2Q2YzNiMWQwNzRjN2E0ZmU5YjcxNmJhYmM4NmE3ZmZjNTljMDQ0ZjRjMTAzNTAzZjVhOGRkMDhlNDUxYTg5MjgwMDY1NzJiYjc3OGViYWUyMWM1Njk4OTUyMTVjMDRmYjZlNTM5MjUwZmRmMzYxYzQxN2JkZjIxYTdiZjFjNWY5NmQ3ZTllYzk2ZjU3MDA1NGM0NzE0NThjZGFmMzAxZDE0MjdjOGY5Mzk2ODMyMjJhNzk2YQ=="
            },
            "subject": {
              "common_name": [
                "loggermonitor.com"
              ],
              "country": [
                "--"
              ],
              "email_address": [
                "[email protected]"
              ],
              "locality": [
                "SomeCity"
              ],
              "organization": [
                "SomeOrganization"
              ],
              "organizational_unit": [
                "SomeOrganizationalUnit"
              ],
              "province": [
                "SomeState"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "loggermonitor.com"
              ],
              "extended_dns_names": [
                {
                  "domain": "loggermonitor",
                  "fld": "loggermonitor.com",
                  "tld": "com"
                }
              ]
            },
            "subject_dn": "/C=--/ST=SomeState/L=SomeCity/O=SomeOrganization/OU=SomeOrganizationalUnit/CN=loggermonitor.com/[email protected]",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "0a60823218807ed8e24a70770520b3f0db7ad149d9076e0eaa8c187b39f32d92",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 1024,
                "modulus": "MHhhZmQyMWYxMzk5Yzk3YjM3NTcyNTUxNjExZGJmMDdhYTFiN2Y4NDAwMDEzNjhjZDRhYmU3ZDM4NjU5ZmE1Mjc1MmUwZWQzYWUwMGYzZWNmMGI3MTk1NDViZGJmOGI0Yzc1NzU0ZTMzNDlhY2Q0NmY2OTg4MzI4ZTU4OGRiOTk4NjE4NDM2ODBhNWI0ZTdiYjZhMDg5MzBhNWZlODIzNmNhNDk4NDFiMGYzNjlmYTYxMjI4MWI3NTI0YTVkMjJiMjBkZDU3NDE4MzdiNDVhZDBlNWY5MmRjZTQwODZlMWQyN2E5OGRiY2NkYjY4M2Q1Yjg4ZWE1M2RmZTdlODYyMzZi"
              }
            },
            "tbs_fingerprint": "108ffbb33096cb8f6dd7a7e0475f9c9d0939f0bc858940556ae30ac4ee6c7f08",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2013-08-27T11:00:58",
              "not_before": "2012-08-27T11:00:58"
            },
            "version": 2
          },
          "fingerprint_sha256": "9AEB4183DDFA4414F2A2B73FBA8CF4085BA07E57624E7BD6FD7FD828EE5467CD",
          "precert": false,
          "raw": "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",
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2010-2023",
          "score": 4.4,
          "severity": "medium"
        },
        {
          "id": "CVE-2010-2024",
          "score": 4.4,
          "severity": "medium"
        },
        {
          "id": "CVE-2010-4344",
          "score": 9.3,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-08T03:46:34.551Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http-proxy",
      "version": "1.3.1 - 1.9.0",
      "product": "HAProxy http proxy",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:haproxy:haproxy",
          "part": "a",
          "vendor": "haproxy",
          "product": "haproxy",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<html><body><h1>503 Service Unavailable</h1>\nNo server is available to handle this request.\n</body></html>\n",
          "body_murmur": -1972326615,
          "body_sha256": "839488ebc08446a096a893996ed23eac321ac166724cd8c5d9092057834d2d79",
          "content_length": -1,
          "headers": {
            "cache_control": [
              "no-cache"
            ],
            "connection": [
              "close"
            ],
            "content_type": [
              "text/html"
            ]
          },
          "protocol": "HTTP/1.0",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.160.128.171",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 503
        }
      },
      "url": "http://182.160.128.171/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-08T20:48:22.233Z"
    },
    {
      "port": 465,
      "protocol": "tcp",
      "name": "smtp",
      "version": "4.63",
      "product": "Exim smtpd",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:exim:exim:4.63",
          "part": "a",
          "vendor": "exim",
          "product": "exim",
          "version": "4\\.63",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "cve": [
        {
          "id": "CVE-2010-2023",
          "score": 4.4,
          "severity": "medium"
        },
        {
          "id": "CVE-2010-2024",
          "score": 4.4,
          "severity": "medium"
        },
        {
          "id": "CVE-2010-4344",
          "score": 9.3,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-18T11:20:56.539Z"
    },
    {
      "port": 587,
      "protocol": "tcp",
      "name": "smtp",
      "version": "4.63",
      "product": "Exim smtpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:exim:exim:4.63",
          "part": "a",
          "vendor": "exim",
          "product": "exim",
          "version": "4\\.63",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "smtp": {
          "banner": "220 loggermonitor.com ESMTP Exim 4.63 Tue, 10 Jun 2025 13:07:22 +0000\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_key_id": "keyid7719d4199441621defc6eab62bd6e6d9e4219d9b\ndirname/c=--/st=somestate/l=somecity/o=someorganization/ou=someorganizationalunit/cn=loggermonitor.com/[email protected]\nserial83dcccedffb7afaa",
              "basic_constraints": {
                "is_ca": true
              },
              "subject_key_id": "7719d4199441621defc6eab62bd6e6d9e4219d9b"
            },
            "fingerprint_md5": "A345C01256215E0FC3AF7105FE2DE2FF",
            "fingerprint_sha1": "1F69D48CE68C36552F7C62490B46C5DB56376087",
            "fingerprint_sha256": "9AEB4183DDFA4414F2A2B73FBA8CF4085BA07E57624E7BD6FD7FD828EE5467CD",
            "issuer": {
              "common_name": [
                "loggermonitor.com"
              ],
              "country": [
                "--"
              ],
              "email_address": [
                "[email protected]"
              ],
              "locality": [
                "SomeCity"
              ],
              "organization": [
                "SomeOrganization"
              ],
              "organizational_unit": [
                "SomeOrganizationalUnit"
              ],
              "province": [
                "SomeState"
              ]
            },
            "issuer_dn": "/C=--/ST=SomeState/L=SomeCity/O=SomeOrganization/OU=SomeOrganizationalUnit/CN=loggermonitor.com/[email protected]",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "9501694636414447530",
            "signature": {
              "algorithm": {
                "name": "SHA1-RSA",
                "oid": "1.2.840.113549.1.1.5"
              },
              "self_signed": true,
              "value": "NzMyNTIwY2U4NzJiMjRlYjE2ZDVjOTNlY2U0MWZjYzFjMjM3YjlkZWUzMjMzMzJiZWNiMWRmOGVhYzQ3NWQyZjE5YWM1ZjVkMmFlN2Q2YzNiMWQwNzRjN2E0ZmU5YjcxNmJhYmM4NmE3ZmZjNTljMDQ0ZjRjMTAzNTAzZjVhOGRkMDhlNDUxYTg5MjgwMDY1NzJiYjc3OGViYWUyMWM1Njk4OTUyMTVjMDRmYjZlNTM5MjUwZmRmMzYxYzQxN2JkZjIxYTdiZjFjNWY5NmQ3ZTllYzk2ZjU3MDA1NGM0NzE0NThjZGFmMzAxZDE0MjdjOGY5Mzk2ODMyMjJhNzk2YQ=="
            },
            "subject": {
              "common_name": [
                "loggermonitor.com"
              ],
              "country": [
                "--"
              ],
              "email_address": [
                "[email protected]"
              ],
              "locality": [
                "SomeCity"
              ],
              "organization": [
                "SomeOrganization"
              ],
              "organizational_unit": [
                "SomeOrganizationalUnit"
              ],
              "province": [
                "SomeState"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "loggermonitor.com"
              ],
              "extended_dns_names": [
                {
                  "domain": "loggermonitor",
                  "fld": "loggermonitor.com",
                  "tld": "com"
                }
              ]
            },
            "subject_dn": "/C=--/ST=SomeState/L=SomeCity/O=SomeOrganization/OU=SomeOrganizationalUnit/CN=loggermonitor.com/[email protected]",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "0a60823218807ed8e24a70770520b3f0db7ad149d9076e0eaa8c187b39f32d92",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 1024,
                "modulus": "MHhhZmQyMWYxMzk5Yzk3YjM3NTcyNTUxNjExZGJmMDdhYTFiN2Y4NDAwMDEzNjhjZDRhYmU3ZDM4NjU5ZmE1Mjc1MmUwZWQzYWUwMGYzZWNmMGI3MTk1NDViZGJmOGI0Yzc1NzU0ZTMzNDlhY2Q0NmY2OTg4MzI4ZTU4OGRiOTk4NjE4NDM2ODBhNWI0ZTdiYjZhMDg5MzBhNWZlODIzNmNhNDk4NDFiMGYzNjlmYTYxMjI4MWI3NTI0YTVkMjJiMjBkZDU3NDE4MzdiNDVhZDBlNWY5MmRjZTQwODZlMWQyN2E5OGRiY2NkYjY4M2Q1Yjg4ZWE1M2RmZTdlODYyMzZi"
              }
            },
            "tbs_fingerprint": "108ffbb33096cb8f6dd7a7e0475f9c9d0939f0bc858940556ae30ac4ee6c7f08",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2013-08-27T11:00:58",
              "not_before": "2012-08-27T11:00:58"
            },
            "version": 2
          },
          "fingerprint_sha256": "9AEB4183DDFA4414F2A2B73FBA8CF4085BA07E57624E7BD6FD7FD828EE5467CD",
          "precert": false,
          "raw": "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",
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2010-2023",
          "score": 4.4,
          "severity": "medium"
        },
        {
          "id": "CVE-2010-2024",
          "score": 4.4,
          "severity": "medium"
        },
        {
          "id": "CVE-2010-4344",
          "score": 9.3,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-10T13:07:23.327Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "mysql",
      "version": "5.0.95",
      "product": "MySQL",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mysql:mysql:5.0.95",
          "part": "a",
          "vendor": "mysql",
          "product": "mysql",
          "version": "5\\.0\\.95",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mysql": {
          "capability_flags": {
            "CLIENT_COMPRESS": true,
            "CLIENT_CONNECT_WITH_DB": true,
            "CLIENT_LONG_FLAG": true,
            "CLIENT_PROTOCOL_41": true,
            "CLIENT_SECURE_CONNECTION": true,
            "CLIENT_TRANSACTIONS": true
          },
          "protocol_version": 10,
          "version": "5.0.95"
        }
      },
      "cve": [
        {
          "id": "CVE-2007-5925",
          "score": 4,
          "severity": "medium"
        },
        {
          "id": "CVE-2009-0819",
          "score": 4,
          "severity": "medium"
        },
        {
          "id": "CVE-2010-1621",
          "score": 5,
          "severity": "medium"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-08T19:39:19.56Z"
    },
    {
      "port": 8086,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "url": "http://182.160.128.171:8086/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-04T08:11:30.159Z"
    },
    {
      "port": 8087,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-06-09T08:05:36.391Z"
    }
  ],
  "services_hash": "3adbcf81babb4c0553c7efc680e06e8a353c990ee4df50673f0ebf9411d8b543",
  "last_updated_at": "2025-06-18T11:20:56.539Z",
  "banner": [
    "smtp",
    "tls",
    "http",
    "mysql"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2007-5925": {
      "id": "CVE-2007-5925",
      "references": [
        "http://bugs.gentoo.org/show_bug.cgi?id=198988",
        "http://bugs.mysql.com/bug.php?id=32125",
        "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html",
        "http://secunia.com/advisories/27568",
        "http://secunia.com/advisories/27649",
        "http://secunia.com/advisories/27823",
        "http://secunia.com/advisories/28025",
        "http://secunia.com/advisories/28040",
        "http://secunia.com/advisories/28099",
        "http://secunia.com/advisories/28108",
        "http://secunia.com/advisories/28128",
        "http://secunia.com/advisories/28838",
        "http://security.gentoo.org/glsa/glsa-200711-25.xml",
        "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959",
        "http://www.debian.org/security/2007/dsa-1413",
        "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243",
        "http://www.redhat.com/support/errata/RHSA-2007-1155.html",
        "http://www.redhat.com/support/errata/RHSA-2007-1157.html",
        "http://www.securityfocus.com/bid/26353",
        "http://www.securitytracker.com/id?1018978",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2007/3903",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390",
        "https://usn.ubuntu.com/559-1/",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html",
        "http://bugs.gentoo.org/show_bug.cgi?id=198988",
        "http://bugs.mysql.com/bug.php?id=32125",
        "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html",
        "http://secunia.com/advisories/27568",
        "http://secunia.com/advisories/27649",
        "http://secunia.com/advisories/27823",
        "http://secunia.com/advisories/28025",
        "http://secunia.com/advisories/28040",
        "http://secunia.com/advisories/28099",
        "http://secunia.com/advisories/28108",
        "http://secunia.com/advisories/28128",
        "http://secunia.com/advisories/28838",
        "http://security.gentoo.org/glsa/glsa-200711-25.xml",
        "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959",
        "http://www.debian.org/security/2007/dsa-1413",
        "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243",
        "http://www.redhat.com/support/errata/RHSA-2007-1155.html",
        "http://www.redhat.com/support/errata/RHSA-2007-1157.html",
        "http://www.securityfocus.com/bid/26353",
        "http://www.securitytracker.com/id?1018978",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2007/3903",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390",
        "https://usn.ubuntu.com/559-1/",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-20"
    },
    "CVE-2009-0819": {
      "id": "CVE-2009-0819",
      "references": [
        "http://bugs.mysql.com/bug.php?id=42495",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html",
        "http://secunia.com/advisories/34115",
        "http://www.securityfocus.com/bid/33972",
        "http://www.securitytracker.com/id?1021786",
        "http://www.vupen.com/english/advisories/2009/0594",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544",
        "http://bugs.mysql.com/bug.php?id=42495",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html",
        "http://secunia.com/advisories/34115",
        "http://www.securityfocus.com/bid/33972",
        "http://www.securitytracker.com/id?1021786",
        "http://www.vupen.com/english/advisories/2009/0594",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via \"an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML(),\" which triggers an assertion failure.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2010-1621": {
      "id": "CVE-2010-1621",
      "references": [
        "http://bugs.mysql.com/bug.php?id=51770",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093",
        "http://www.securityfocus.com/bid/39543",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://bugs.mysql.com/bug.php?id=51770",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093",
        "http://www.securityfocus.com/bid/39543",
        "http://www.ubuntu.com/usn/USN-1397-1"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
      "weakness": "CWE-264"
    },
    "CVE-2010-1626": {
      "id": "CVE-2010-1626",
      "references": [
        "http://bugs.mysql.com/bug.php?id=40980",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html",
        "http://securitytracker.com/id?1024004",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101",
        "http://www.openwall.com/lists/oss-security/2010/05/10/2",
        "http://www.openwall.com/lists/oss-security/2010/05/18/4",
        "http://www.redhat.com/support/errata/RHSA-2010-0442.html",
        "http://www.securityfocus.com/bid/40257",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2010/1194",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490",
        "http://bugs.mysql.com/bug.php?id=40980",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html",
        "http://securitytracker.com/id?1024004",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101",
        "http://www.openwall.com/lists/oss-security/2010/05/10/2",
        "http://www.openwall.com/lists/oss-security/2010/05/18/4",
        "http://www.redhat.com/support/errata/RHSA-2010-0442.html",
        "http://www.securityfocus.com/bid/40257",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2010/1194",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490"
      ],
      "score": 3.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.",
      "vector_string": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
      "weakness": "CWE-59"
    },
    "CVE-2010-2023": {
      "id": "CVE-2010-2023",
      "references": [
        "http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html",
        "http://bugs.exim.org/show_bug.cgi?id=988",
        "http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
        "http://secunia.com/advisories/40019",
        "http://secunia.com/advisories/40123",
        "http://secunia.com/advisories/43243",
        "http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2",
        "http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24&r2=1.25",
        "http://www.securityfocus.com/archive/1/511653/100/0/threaded",
        "http://www.securityfocus.com/bid/40451",
        "http://www.ubuntu.com/usn/USN-1060-1",
        "http://www.vupen.com/english/advisories/2010/1402",
        "http://www.vupen.com/english/advisories/2011/0364",
        "https://bugzilla.redhat.com/show_bug.cgi?id=600093",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/59043",
        "http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html",
        "http://bugs.exim.org/show_bug.cgi?id=988",
        "http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
        "http://secunia.com/advisories/40019",
        "http://secunia.com/advisories/40123",
        "http://secunia.com/advisories/43243",
        "http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2",
        "http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24&r2=1.25",
        "http://www.securityfocus.com/archive/1/511653/100/0/threaded",
        "http://www.securityfocus.com/bid/40451",
        "http://www.ubuntu.com/usn/USN-1060-1",
        "http://www.vupen.com/english/advisories/2010/1402",
        "http://www.vupen.com/english/advisories/2011/0364",
        "https://bugzilla.redhat.com/show_bug.cgi?id=600093",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/59043"
      ],
      "score": 4.4,
      "services": [
        "465/smtp"
      ],
      "severity": "medium",
      "summary": "transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.",
      "vector_string": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-362"
    },
    "CVE-2010-2024": {
      "id": "CVE-2010-2024",
      "references": [
        "http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html",
        "http://bugs.exim.org/show_bug.cgi?id=989",
        "http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
        "http://secunia.com/advisories/40019",
        "http://secunia.com/advisories/40123",
        "http://secunia.com/advisories/43243",
        "http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2",
        "http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.25&r2=1.26",
        "http://www.securityfocus.com/archive/1/511653/100/0/threaded",
        "http://www.securityfocus.com/bid/40454",
        "http://www.ubuntu.com/usn/USN-1060-1",
        "http://www.vupen.com/english/advisories/2010/1402",
        "http://www.vupen.com/english/advisories/2011/0364",
        "https://bugzilla.redhat.com/show_bug.cgi?id=600097",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/59042",
        "http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html",
        "http://bugs.exim.org/show_bug.cgi?id=989",
        "http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
        "http://secunia.com/advisories/40019",
        "http://secunia.com/advisories/40123",
        "http://secunia.com/advisories/43243",
        "http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2",
        "http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.25&r2=1.26",
        "http://www.securityfocus.com/archive/1/511653/100/0/threaded",
        "http://www.securityfocus.com/bid/40454",
        "http://www.ubuntu.com/usn/USN-1060-1",
        "http://www.vupen.com/english/advisories/2010/1402",
        "http://www.vupen.com/english/advisories/2011/0364",
        "https://bugzilla.redhat.com/show_bug.cgi?id=600097",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/59042"
      ],
      "score": 4.4,
      "services": [
        "465/smtp"
      ],
      "severity": "medium",
      "summary": "transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.",
      "vector_string": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-362"
    },
    "CVE-2010-3677": {
      "id": "CVE-2010-3677",
      "references": [
        "http://bugs.mysql.com/bug.php?id=54575",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42646",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628040",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688",
        "http://bugs.mysql.com/bug.php?id=54575",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42646",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628040",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-399"
    },
    "CVE-2010-3682": {
      "id": "CVE-2010-3682",
      "references": [
        "http://bugs.mysql.com/bug.php?id=52711",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42599",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628328",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684",
        "http://bugs.mysql.com/bug.php?id=52711",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42599",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628328",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2010-4344": {
      "id": "CVE-2010-4344",
      "references": [
        "ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.70",
        "http://atmail.com/blog/2010/atmail-6204-now-available/",
        "http://bugs.exim.org/show_bug.cgi?id=787",
        "http://git.exim.org/exim.git/commit/24c929a27415c7cfc7126c47e4cad39acf3efa6b",
        "http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html",
        "http://openwall.com/lists/oss-security/2010/12/10/1",
        "http://secunia.com/advisories/40019",
        "http://secunia.com/advisories/42576",
        "http://secunia.com/advisories/42586",
        "http://secunia.com/advisories/42587",
        "http://secunia.com/advisories/42589",
        "http://www.cpanel.net/2010/12/exim-remote-memory-corruption-vulnerability-notification-cve-2010-4344.html",
        "http://www.debian.org/security/2010/dsa-2131",
        "http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html",
        "http://www.kb.cert.org/vuls/id/682457",
        "http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format",
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "http://www.osvdb.org/69685",
        "http://www.redhat.com/support/errata/RHSA-2010-0970.html",
        "http://www.securityfocus.com/archive/1/515172/100/0/threaded",
        "http://www.securityfocus.com/bid/45308",
        "http://www.securitytracker.com/id?1024858",
        "http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/",
        "http://www.ubuntu.com/usn/USN-1032-1",
        "http://www.vupen.com/english/advisories/2010/3171",
        "http://www.vupen.com/english/advisories/2010/3172",
        "http://www.vupen.com/english/advisories/2010/3181",
        "http://www.vupen.com/english/advisories/2010/3186",
        "http://www.vupen.com/english/advisories/2010/3204",
        "http://www.vupen.com/english/advisories/2010/3246",
        "http://www.vupen.com/english/advisories/2010/3317",
        "https://bugzilla.redhat.com/show_bug.cgi?id=661756",
        "ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.70",
        "http://atmail.com/blog/2010/atmail-6204-now-available/",
        "http://bugs.exim.org/show_bug.cgi?id=787",
        "http://git.exim.org/exim.git/commit/24c929a27415c7cfc7126c47e4cad39acf3efa6b",
        "http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html",
        "http://openwall.com/lists/oss-security/2010/12/10/1",
        "http://secunia.com/advisories/40019",
        "http://secunia.com/advisories/42576",
        "http://secunia.com/advisories/42586",
        "http://secunia.com/advisories/42587",
        "http://secunia.com/advisories/42589",
        "http://www.cpanel.net/2010/12/exim-remote-memory-corruption-vulnerability-notification-cve-2010-4344.html",
        "http://www.debian.org/security/2010/dsa-2131",
        "http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html",
        "http://www.kb.cert.org/vuls/id/682457",
        "http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format",
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "http://www.osvdb.org/69685",
        "http://www.redhat.com/support/errata/RHSA-2010-0970.html",
        "http://www.securityfocus.com/archive/1/515172/100/0/threaded",
        "http://www.securityfocus.com/bid/45308",
        "http://www.securitytracker.com/id?1024858",
        "http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/",
        "http://www.ubuntu.com/usn/USN-1032-1",
        "http://www.vupen.com/english/advisories/2010/3171",
        "http://www.vupen.com/english/advisories/2010/3172",
        "http://www.vupen.com/english/advisories/2010/3181",
        "http://www.vupen.com/english/advisories/2010/3186",
        "http://www.vupen.com/english/advisories/2010/3204",
        "http://www.vupen.com/english/advisories/2010/3246",
        "http://www.vupen.com/english/advisories/2010/3317",
        "https://bugzilla.redhat.com/show_bug.cgi?id=661756"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2010-4345": {
      "id": "CVE-2010-4345",
      "references": [
        "http://bugs.exim.org/show_bug.cgi?id=1044",
        "http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html",
        "http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html",
        "http://openwall.com/lists/oss-security/2010/12/10/1",
        "http://secunia.com/advisories/42576",
        "http://secunia.com/advisories/42930",
        "http://secunia.com/advisories/43128",
        "http://secunia.com/advisories/43243",
        "http://www.cpanel.net/2010/12/critical-exim-security-update.html",
        "http://www.debian.org/security/2010/dsa-2131",
        "http://www.debian.org/security/2011/dsa-2154",
        "http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html",
        "http://www.kb.cert.org/vuls/id/758489",
        "http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format",
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "http://www.redhat.com/support/errata/RHSA-2011-0153.html",
        "http://www.securityfocus.com/archive/1/515172/100/0/threaded",
        "http://www.securityfocus.com/bid/45341",
        "http://www.securitytracker.com/id?1024859",
        "http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/",
        "http://www.ubuntu.com/usn/USN-1060-1",
        "http://www.vupen.com/english/advisories/2010/3171",
        "http://www.vupen.com/english/advisories/2010/3204",
        "http://www.vupen.com/english/advisories/2011/0135",
        "http://www.vupen.com/english/advisories/2011/0245",
        "http://www.vupen.com/english/advisories/2011/0364",
        "https://bugzilla.redhat.com/show_bug.cgi?id=662012",
        "http://bugs.exim.org/show_bug.cgi?id=1044",
        "http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html",
        "http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html",
        "http://openwall.com/lists/oss-security/2010/12/10/1",
        "http://secunia.com/advisories/42576",
        "http://secunia.com/advisories/42930",
        "http://secunia.com/advisories/43128",
        "http://secunia.com/advisories/43243",
        "http://www.cpanel.net/2010/12/critical-exim-security-update.html",
        "http://www.debian.org/security/2010/dsa-2131",
        "http://www.debian.org/security/2011/dsa-2154",
        "http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html",
        "http://www.kb.cert.org/vuls/id/758489",
        "http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format",
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "http://www.redhat.com/support/errata/RHSA-2011-0153.html",
        "http://www.securityfocus.com/archive/1/515172/100/0/threaded",
        "http://www.securityfocus.com/bid/45341",
        "http://www.securitytracker.com/id?1024859",
        "http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/",
        "http://www.ubuntu.com/usn/USN-1060-1",
        "http://www.vupen.com/english/advisories/2010/3171",
        "http://www.vupen.com/english/advisories/2010/3204",
        "http://www.vupen.com/english/advisories/2011/0135",
        "http://www.vupen.com/english/advisories/2011/0245",
        "http://www.vupen.com/english/advisories/2011/0364",
        "https://bugzilla.redhat.com/show_bug.cgi?id=662012"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2011-0017": {
      "id": "CVE-2011-0017",
      "references": [
        "ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74",
        "http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html",
        "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html",
        "http://osvdb.org/70696",
        "http://secunia.com/advisories/43101",
        "http://secunia.com/advisories/43128",
        "http://secunia.com/advisories/43243",
        "http://www.debian.org/security/2011/dsa-2154",
        "http://www.securityfocus.com/bid/46065",
        "http://www.ubuntu.com/usn/USN-1060-1",
        "http://www.vupen.com/english/advisories/2011/0224",
        "http://www.vupen.com/english/advisories/2011/0245",
        "http://www.vupen.com/english/advisories/2011/0364",
        "http://www.vupen.com/english/advisories/2011/0464",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/65028",
        "ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74",
        "http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html",
        "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html",
        "http://osvdb.org/70696",
        "http://secunia.com/advisories/43101",
        "http://secunia.com/advisories/43128",
        "http://secunia.com/advisories/43243",
        "http://www.debian.org/security/2011/dsa-2154",
        "http://www.securityfocus.com/bid/46065",
        "http://www.ubuntu.com/usn/USN-1060-1",
        "http://www.vupen.com/english/advisories/2011/0224",
        "http://www.vupen.com/english/advisories/2011/0245",
        "http://www.vupen.com/english/advisories/2011/0364",
        "http://www.vupen.com/english/advisories/2011/0464",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/65028"
      ],
      "score": 6.9,
      "services": [
        "465/smtp"
      ],
      "severity": "medium",
      "summary": "The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.",
      "vector_string": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
      "weakness": "CWE-20"
    },
    "CVE-2011-1764": {
      "id": "CVE-2011-1764",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624670",
        "http://bugs.exim.org/show_bug.cgi?id=1106",
        "http://git.exim.org/exim.git/commit/337e3505b0e6cd4309db6bf6062b33fa56e06cf8",
        "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html",
        "http://secunia.com/advisories/51155",
        "http://www.debian.org/security/2011/dsa-2232",
        "https://bugzilla.redhat.com/show_bug.cgi?id=702474",
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624670",
        "http://bugs.exim.org/show_bug.cgi?id=1106",
        "http://git.exim.org/exim.git/commit/337e3505b0e6cd4309db6bf6062b33fa56e06cf8",
        "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html",
        "http://secunia.com/advisories/51155",
        "http://www.debian.org/security/2011/dsa-2232",
        "https://bugzilla.redhat.com/show_bug.cgi?id=702474"
      ],
      "score": 7.5,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-134"
    },
    "CVE-2014-2957": {
      "id": "CVE-2014-2957",
      "references": [
        "http://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0",
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html",
        "http://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0",
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html"
      ],
      "score": 6.8,
      "services": [
        "465/smtp"
      ],
      "severity": "medium",
      "summary": "The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-20"
    },
    "CVE-2014-2972": {
      "id": "CVE-2014-2972",
      "references": [
        "http://git.exim.org/exim.git/commitdiff/7685ce68148a083d7759e78d01aa5198fc099c44",
        "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136251.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136264.html",
        "http://www.ubuntu.com/usn/USN-2933-1",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1122552",
        "https://lists.exim.org/lurker/message/20140722.145949.42c043f5.en.html",
        "https://lists.exim.org/lurker/message/20140722.152452.d6c019e8.en.html",
        "https://security.gentoo.org/glsa/201607-12",
        "http://git.exim.org/exim.git/commitdiff/7685ce68148a083d7759e78d01aa5198fc099c44",
        "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136251.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136264.html",
        "http://www.ubuntu.com/usn/USN-2933-1",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1122552",
        "https://lists.exim.org/lurker/message/20140722.145949.42c043f5.en.html",
        "https://lists.exim.org/lurker/message/20140722.152452.d6c019e8.en.html",
        "https://security.gentoo.org/glsa/201607-12"
      ],
      "score": 4.6,
      "services": [
        "465/smtp"
      ],
      "severity": "medium",
      "summary": "expand.c in Exim before 4.83 expands mathematical comparisons twice, which allows local users to gain privileges and execute arbitrary commands via a crafted lookup value.",
      "vector_string": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-189"
    },
    "CVE-2015-2575": {
      "id": "CVE-2015-2575",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html",
        "http://www.debian.org/security/2016/dsa-3621",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74075",
        "http://www.securitytracker.com/id/1032121",
        "https://security.netapp.com/advisory/ntap-20150417-0003/",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html",
        "http://www.debian.org/security/2016/dsa-3621",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74075",
        "http://www.securitytracker.com/id/1032121",
        "https://security.netapp.com/advisory/ntap-20150417-0003/"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.",
      "vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-1531": {
      "id": "CVE-2016-1531",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00026.html",
        "http://packetstormsecurity.com/files/136124/Exim-4.84-3-Local-Root-Privilege-Escalation.html",
        "http://www.debian.org/security/2016/dsa-3517",
        "http://www.exim.org/static/doc/CVE-2016-1531.txt",
        "http://www.rapid7.com/db/modules/exploit/unix/local/exim_perl_startup",
        "http://www.securitytracker.com/id/1035512",
        "http://www.ubuntu.com/usn/USN-2933-1",
        "https://www.exploit-db.com/exploits/39535/",
        "https://www.exploit-db.com/exploits/39549/",
        "https://www.exploit-db.com/exploits/39702/",
        "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00026.html",
        "http://packetstormsecurity.com/files/136124/Exim-4.84-3-Local-Root-Privilege-Escalation.html",
        "http://www.debian.org/security/2016/dsa-3517",
        "http://www.exim.org/static/doc/CVE-2016-1531.txt",
        "http://www.rapid7.com/db/modules/exploit/unix/local/exim_perl_startup",
        "http://www.securitytracker.com/id/1035512",
        "http://www.ubuntu.com/usn/USN-2933-1",
        "https://www.exploit-db.com/exploits/39535/",
        "https://www.exploit-db.com/exploits/39549/",
        "https://www.exploit-db.com/exploits/39702/"
      ],
      "score": 7,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.",
      "vector_string": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-264"
    },
    "CVE-2016-9963": {
      "id": "CVE-2016-9963",
      "references": [
        "http://www.debian.org/security/2016/dsa-3747",
        "http://www.exim.org/static/doc/CVE-2016-9963.txt",
        "http://www.securityfocus.com/bid/94947",
        "http://www.securitytracker.com/id/1037484",
        "http://www.ubuntu.com/usn/USN-3164-1",
        "https://bugs.exim.org/show_bug.cgi?id=1996",
        "http://www.debian.org/security/2016/dsa-3747",
        "http://www.exim.org/static/doc/CVE-2016-9963.txt",
        "http://www.securityfocus.com/bid/94947",
        "http://www.securitytracker.com/id/1037484",
        "http://www.ubuntu.com/usn/USN-3164-1",
        "https://bugs.exim.org/show_bug.cgi?id=1996"
      ],
      "score": 5.9,
      "services": [
        "465/smtp"
      ],
      "severity": "medium",
      "summary": "Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.",
      "vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-320"
    },
    "CVE-2017-1000369": {
      "id": "CVE-2017-1000369",
      "references": [
        "http://www.debian.org/security/2017/dsa-3888",
        "http://www.securityfocus.com/bid/99252",
        "http://www.securitytracker.com/id/1038779",
        "https://access.redhat.com/security/cve/CVE-2017-1000369",
        "https://github.com/Exim/exim/commit/65e061b76867a9ea7aeeb535341b790b90ae6c21",
        "https://security.gentoo.org/glsa/201709-19",
        "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
        "http://www.debian.org/security/2017/dsa-3888",
        "http://www.securityfocus.com/bid/99252",
        "http://www.securitytracker.com/id/1038779",
        "https://access.redhat.com/security/cve/CVE-2017-1000369",
        "https://github.com/Exim/exim/commit/65e061b76867a9ea7aeeb535341b790b90ae6c21",
        "https://security.gentoo.org/glsa/201709-19",
        "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
      ],
      "score": 4,
      "services": [
        "465/smtp"
      ],
      "severity": "medium",
      "summary": "Exim supports the use of multiple \"-p\" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "CWE-404"
    },
    "CVE-2018-6789": {
      "id": "CVE-2018-6789",
      "references": [
        "http://openwall.com/lists/oss-security/2018/02/10/2",
        "http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html",
        "http://www.openwall.com/lists/oss-security/2018/02/07/2",
        "http://www.securityfocus.com/bid/103049",
        "http://www.securitytracker.com/id/1040461",
        "https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/",
        "https://exim.org/static/doc/security/CVE-2018-6789.txt",
        "https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1",
        "https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html",
        "https://usn.ubuntu.com/3565-1/",
        "https://www.debian.org/security/2018/dsa-4110",
        "https://www.exploit-db.com/exploits/44571/",
        "https://www.exploit-db.com/exploits/45671/",
        "http://openwall.com/lists/oss-security/2018/02/10/2",
        "http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html",
        "http://www.openwall.com/lists/oss-security/2018/02/07/2",
        "http://www.securityfocus.com/bid/103049",
        "http://www.securitytracker.com/id/1040461",
        "https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/",
        "https://exim.org/static/doc/security/CVE-2018-6789.txt",
        "https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1",
        "https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html",
        "https://usn.ubuntu.com/3565-1/",
        "https://www.debian.org/security/2018/dsa-4110",
        "https://www.exploit-db.com/exploits/44571/",
        "https://www.exploit-db.com/exploits/45671/"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-120"
    },
    "CVE-2019-15846": {
      "id": "CVE-2019-15846",
      "references": [
        "http://exim.org/static/doc/security/CVE-2019-15846.txt",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html",
        "http://www.openwall.com/lists/oss-security/2019/09/06/2",
        "http://www.openwall.com/lists/oss-security/2019/09/06/4",
        "http://www.openwall.com/lists/oss-security/2019/09/06/5",
        "http://www.openwall.com/lists/oss-security/2019/09/06/6",
        "http://www.openwall.com/lists/oss-security/2019/09/06/8",
        "http://www.openwall.com/lists/oss-security/2019/09/07/1",
        "http://www.openwall.com/lists/oss-security/2019/09/07/2",
        "http://www.openwall.com/lists/oss-security/2019/09/08/1",
        "http://www.openwall.com/lists/oss-security/2019/09/09/1",
        "https://exim.org/static/doc/security/CVE-2019-15846.txt",
        "https://lists.debian.org/debian-lts-announce/2019/09/msg00004.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FT3GY7V7SR2RHKNZNQCGXFWUSILVSZNU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDF37AUNETIOXY6ZLQAUBGBVUTMMV242/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBNHDAF74RI6VK2JVSEIE3VYNL7JJDYM/",
        "https://seclists.org/bugtraq/2019/Sep/13",
        "https://security.gentoo.org/glsa/201909-06",
        "https://usn.ubuntu.com/4124-1/",
        "https://usn.ubuntu.com/4124-2/",
        "https://www.debian.org/security/2019/dsa-4517",
        "https://www.kb.cert.org/vuls/id/672565",
        "https://www.openwall.com/lists/oss-security/2019/09/06/1",
        "http://exim.org/static/doc/security/CVE-2019-15846.txt",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html",
        "http://www.openwall.com/lists/oss-security/2019/09/06/2",
        "http://www.openwall.com/lists/oss-security/2019/09/06/4",
        "http://www.openwall.com/lists/oss-security/2019/09/06/5",
        "http://www.openwall.com/lists/oss-security/2019/09/06/6",
        "http://www.openwall.com/lists/oss-security/2019/09/06/8",
        "http://www.openwall.com/lists/oss-security/2019/09/07/1",
        "http://www.openwall.com/lists/oss-security/2019/09/07/2",
        "http://www.openwall.com/lists/oss-security/2019/09/08/1",
        "http://www.openwall.com/lists/oss-security/2019/09/09/1",
        "https://exim.org/static/doc/security/CVE-2019-15846.txt",
        "https://lists.debian.org/debian-lts-announce/2019/09/msg00004.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FT3GY7V7SR2RHKNZNQCGXFWUSILVSZNU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDF37AUNETIOXY6ZLQAUBGBVUTMMV242/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBNHDAF74RI6VK2JVSEIE3VYNL7JJDYM/",
        "https://seclists.org/bugtraq/2019/Sep/13",
        "https://security.gentoo.org/glsa/201909-06",
        "https://usn.ubuntu.com/4124-1/",
        "https://usn.ubuntu.com/4124-2/",
        "https://www.debian.org/security/2019/dsa-4517",
        "https://www.kb.cert.org/vuls/id/672565",
        "https://www.openwall.com/lists/oss-security/2019/09/06/1"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-12783": {
      "id": "CVE-2020-12783",
      "references": [
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "https://bugs.exim.org/show_bug.cgi?id=2571",
        "https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86",
        "https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0",
        "https://lists.debian.org/debian-lts-announce/2020/05/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6IQQ2SERFUD4WMRSX6XYDNK7Q4GPT7Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7Z5UG6ZIG32V7M4PP3BCC65C27EWK7G/",
        "https://usn.ubuntu.com/4366-1/",
        "https://www.debian.org/security/2020/dsa-4687",
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "https://bugs.exim.org/show_bug.cgi?id=2571",
        "https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86",
        "https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0",
        "https://lists.debian.org/debian-lts-announce/2020/05/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6IQQ2SERFUD4WMRSX6XYDNK7Q4GPT7Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7Z5UG6ZIG32V7M4PP3BCC65C27EWK7G/",
        "https://usn.ubuntu.com/4366-1/",
        "https://www.debian.org/security/2020/dsa-4687"
      ],
      "score": 7.5,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-125"
    },
    "CVE-2020-28007": {
      "id": "CVE-2020-28007",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-59"
    },
    "CVE-2020-28008": {
      "id": "CVE-2020-28008",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-269"
    },
    "CVE-2020-28009": {
      "id": "CVE-2020-28009",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days).",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2020-28010": {
      "id": "CVE-2020-28010",
      "references": [
        "http://www.openwall.com/lists/oss-security/2021/07/22/7",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt",
        "http://www.openwall.com/lists/oss-security/2021/07/22/7",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28011": {
      "id": "CVE-2020-28011",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28012": {
      "id": "CVE-2020-28012",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-28013": {
      "id": "CVE-2020-28013",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles \"-F '.('\" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28014": {
      "id": "CVE-2020-28014",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt"
      ],
      "score": 6.1,
      "services": [
        "465/smtp"
      ],
      "severity": "medium",
      "summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
      "weakness": "CWE-269"
    },
    "CVE-2020-28015": {
      "id": "CVE-2020-28015",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-28016": {
      "id": "CVE-2020-28016",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt"
      ],
      "score": 7.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because \"-F ''\" is mishandled by parse_fix_phrase.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28017": {
      "id": "CVE-2020-28017",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2020-28020": {
      "id": "CVE-2020-28020",
      "references": [
        "http://www.openwall.com/lists/oss-security/2021/07/25/1",
        "http://www.openwall.com/lists/oss-security/2021/08/03/1",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28020-HSIZE.txt",
        "http://www.openwall.com/lists/oss-security/2021/07/25/1",
        "http://www.openwall.com/lists/oss-security/2021/08/03/1",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28020-HSIZE.txt"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2020-28021": {
      "id": "CVE-2020-28021",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt"
      ],
      "score": 8.8,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-28022": {
      "id": "CVE-2020-28022",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28023": {
      "id": "CVE-2020-28023",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt"
      ],
      "score": 7.5,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-125"
    },
    "CVE-2020-28024": {
      "id": "CVE-2020-28024",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28025": {
      "id": "CVE-2020-28025",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt"
      ],
      "score": 7.5,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-125"
    },
    "CVE-2020-28026": {
      "id": "CVE-2020-28026",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-8015": {
      "id": "CVE-2020-8015",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00010.html",
        "https://bugzilla.suse.com/show_bug.cgi?id=1154183",
        "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00010.html",
        "https://bugzilla.suse.com/show_bug.cgi?id=1154183"
      ],
      "score": 8.4,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-59"
    },
    "CVE-2021-27216": {
      "id": "CVE-2021-27216",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt"
      ],
      "score": 6.3,
      "services": [
        "465/smtp"
      ],
      "severity": "medium",
      "summary": "Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
      "weakness": "CWE-362"
    },
    "CVE-2021-38371": {
      "id": "CVE-2021-38371",
      "references": [
        "https://nostarttls.secvuln.info",
        "https://www.exim.org",
        "https://www.exim.org/static/doc/security/CVE-2021-38371.txt",
        "https://nostarttls.secvuln.info",
        "https://www.exim.org",
        "https://www.exim.org/static/doc/security/CVE-2021-38371.txt"
      ],
      "score": 7.5,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-74"
    },
    "CVE-2022-37451": {
      "id": "CVE-2022-37451",
      "references": [
        "https://cwe.mitre.org/data/definitions/762.html",
        "https://github.com/Exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42",
        "https://github.com/Exim/exim/compare/exim-4.95...exim-4.96",
        "https://github.com/Exim/exim/wiki/EximSecurity",
        "https://github.com/ivd38/exim_invalid_free",
        "https://lists.exim.org/lurker/message/20220625.141825.d6de6074.en.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LETR5CVDPFOFQHXCJP6NFLG52JZHQYDY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XSWDF4QEXD4TDWQLYQOWCHBJKTDQR4Z7/",
        "https://www.exim.org/static/doc/security/",
        "https://www.openwall.com/lists/oss-security/2022/08/06/1",
        "https://cwe.mitre.org/data/definitions/762.html",
        "https://github.com/Exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42",
        "https://github.com/Exim/exim/compare/exim-4.95...exim-4.96",
        "https://github.com/Exim/exim/wiki/EximSecurity",
        "https://github.com/ivd38/exim_invalid_free",
        "https://lists.exim.org/lurker/message/20220625.141825.d6de6074.en.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LETR5CVDPFOFQHXCJP6NFLG52JZHQYDY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XSWDF4QEXD4TDWQLYQOWCHBJKTDQR4Z7/",
        "https://www.exim.org/static/doc/security/",
        "https://www.openwall.com/lists/oss-security/2022/08/06/1"
      ],
      "score": 7.5,
      "services": [
        "465/smtp"
      ],
      "severity": "high",
      "summary": "Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-763"
    },
    "CVE-2022-37452": {
      "id": "CVE-2022-37452",
      "references": [
        "https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743",
        "https://github.com/Exim/exim/compare/exim-4.94...exim-4.95",
        "https://github.com/Exim/exim/wiki/EximSecurity",
        "https://github.com/ivd38/exim_overflow",
        "https://lists.debian.org/debian-lts-announce/2022/08/msg00014.html",
        "https://www.exim.org/static/doc/security/",
        "https://www.openwall.com/lists/oss-security/2022/08/06/8",
        "https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743",
        "https://github.com/Exim/exim/compare/exim-4.94...exim-4.95",
        "https://github.com/Exim/exim/wiki/EximSecurity",
        "https://github.com/ivd38/exim_overflow",
        "https://lists.debian.org/debian-lts-announce/2022/08/msg00014.html",
        "https://www.exim.org/static/doc/security/",
        "https://www.openwall.com/lists/oss-security/2022/08/06/8"
      ],
      "score": 9.8,
      "services": [
        "465/smtp"
      ],
      "severity": "critical",
      "summary": "Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2023-51766": {
      "id": "CVE-2023-51766",
      "references": [
        "http://www.openwall.com/lists/oss-security/2023/12/24/1",
        "http://www.openwall.com/lists/oss-security/2023/12/25/1",
        "http://www.openwall.com/lists/oss-security/2023/12/29/2",
        "http://www.openwall.com/lists/oss-security/2024/01/01/1",
        "http://www.openwall.com/lists/oss-security/2024/01/01/2",
        "http://www.openwall.com/lists/oss-security/2024/01/01/3",
        "https://bugs.exim.org/show_bug.cgi?id=3063",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255852",
        "https://exim.org/static/doc/security/CVE-2023-51766.txt",
        "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html",
        "https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca",
        "https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5",
        "https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/",
        "https://lwn.net/Articles/956533/",
        "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/",
        "https://www.openwall.com/lists/oss-security/2023/12/23/2",
        "https://www.youtube.com/watch?v=V8KPV96g1To",
        "http://www.openwall.com/lists/oss-security/2023/12/24/1",
        "http://www.openwall.com/lists/oss-security/2023/12/25/1",
        "http://www.openwall.com/lists/oss-security/2023/12/29/2",
        "http://www.openwall.com/lists/oss-security/2024/01/01/1",
        "http://www.openwall.com/lists/oss-security/2024/01/01/2",
        "http://www.openwall.com/lists/oss-security/2024/01/01/3",
        "https://bugs.exim.org/show_bug.cgi?id=3063",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255852",
        "https://exim.org/static/doc/security/CVE-2023-51766.txt",
        "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html",
        "https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca",
        "https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5",
        "https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/",
        "https://lwn.net/Articles/956533/",
        "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/",
        "https://www.openwall.com/lists/oss-security/2023/12/23/2",
        "https://www.youtube.com/watch?v=V8KPV96g1To"
      ],
      "score": 5.3,
      "services": [
        "465/smtp"
      ],
      "severity": "medium",
      "summary": "Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "CWE-345"
    }
  }
}