Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2026 Cyble Inc. All Rights Reserved.

207.148.103.159

SummaryCVE DetailsRaw Data
12 Feb 2026, 20:49:51 UTC
{
  "scan_id": 1770860457,
  "ip": "207.148.103.159",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "207.148.96.0/20",
    "postal_code": "140-0001",
    "coordinates": {
      "latitude": "35.6164",
      "longitude": "139.7425"
    },
    "geo_point": "35.6164, 139.7425",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "JP",
    "country_name": "Japan",
    "city": "Minamishinagawa"
  },
  "location_updated_at": "2026-02-12T17:11:58Z",
  "asn": {
    "number": "AS20473",
    "organization": "The Constant Company, LLC",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "",
    "organization": "",
    "descr": "",
    "_encoding": {
      "raw": ""
    }
  },
  "whois_updated_at": "0001-01-01T00:00:00Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2026-02-12T17:11:58Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2026-02-12T20:25:23Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2026-02-12T17:11:58Z"
    }
  ],
  "hostnames": [
    {
      "name": "207.148.103.159.vultrusercontent.com",
      "last_updated_at": "2026-02-12T20:25:23Z"
    }
  ],
  "services": [
    {
      "port": 21,
      "protocol": "tcp",
      "name": "ftp",
      "version": "",
      "product": "Dionaea honeypot ftpd",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "ftp": {
          "banner": "220 Welcome to the ftp service\r\n"
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-11T12:37:01.957Z"
    },
    {
      "port": 25,
      "protocol": "tcp",
      "name": "smtp",
      "version": "4.89",
      "product": "Exim smtpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:exim:exim:4.89",
          "part": "a",
          "vendor": "exim",
          "product": "exim",
          "version": "4\\.89",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "smtp": {
          "banner": "220 ashelymadsions ESMTP Exim 4.89 OpenSMTPD\r\n"
        }
      },
      "cve": [
        {
          "id": "CVE-2017-1000369",
          "score": 4,
          "severity": "medium"
        },
        {
          "id": "CVE-2017-16943",
          "score": 9.8,
          "severity": "critical"
        },
        {
          "id": "CVE-2017-16944",
          "score": 7.5,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-09T01:15:11.053Z"
    },
    {
      "port": 445,
      "protocol": "tcp",
      "name": "microsoft-ds",
      "version": "",
      "product": "Dionaea honeypot smbd",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "smb": {
          "capabilities": [],
          "negotiation": [],
          "smbv1_support": true,
          "version": "1.0.0"
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-09T14:13:52.526Z"
    },
    {
      "port": 2525,
      "protocol": "tcp",
      "name": "smtp",
      "version": "4.89",
      "product": "Exim smtpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:exim:exim:4.89",
          "part": "a",
          "vendor": "exim",
          "product": "exim",
          "version": "4\\.89",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "smtp": {
          "banner": "220 ashelymadsions ESMTP Exim 4.89 OpenSMTPD\r\n"
        }
      },
      "cve": [
        {
          "id": "CVE-2017-1000369",
          "score": 4,
          "severity": "medium"
        },
        {
          "id": "CVE-2017-16943",
          "score": 9.8,
          "severity": "critical"
        },
        {
          "id": "CVE-2017-16944",
          "score": 7.5,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-11T10:00:00.736Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "mysql",
      "version": "5.0.54",
      "product": "MySQL",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mysql:mysql:5.0.54",
          "part": "a",
          "vendor": "mysql",
          "product": "mysql",
          "version": "5\\.0\\.54",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mysql": {
          "capability_flags": {
            "CLIENT_COMPRESS": true,
            "CLIENT_CONNECT_WITH_DB": true,
            "CLIENT_LONG_FLAG": true,
            "CLIENT_PROTOCOL_41": true,
            "CLIENT_SECURE_CONNECTION": true,
            "CLIENT_TRANSACTIONS": true
          },
          "protocol_version": 10,
          "version": "5.0.54"
        }
      },
      "cve": [
        {
          "id": "CVE-2007-5925",
          "score": 4,
          "severity": "medium"
        },
        {
          "id": "CVE-2008-0226",
          "score": 7.5,
          "severity": "high"
        },
        {
          "id": "CVE-2008-2079",
          "score": 4.6,
          "severity": "medium"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-12T20:49:51.893Z"
    }
  ],
  "services_hash": "837c2b481483b8ca4feaec9da6ebd74266327e8b67c3b916a799edb1b1ce62db",
  "last_updated_at": "2026-02-12T20:49:51.893Z",
  "banner": [
    "mysql",
    "ftp",
    "smtp",
    "smb"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2007-5925": {
      "id": "CVE-2007-5925",
      "references": [
        "http://bugs.gentoo.org/show_bug.cgi?id=198988",
        "http://bugs.mysql.com/bug.php?id=32125",
        "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html",
        "http://secunia.com/advisories/27568",
        "http://secunia.com/advisories/27649",
        "http://secunia.com/advisories/27823",
        "http://secunia.com/advisories/28025",
        "http://secunia.com/advisories/28040",
        "http://secunia.com/advisories/28099",
        "http://secunia.com/advisories/28108",
        "http://secunia.com/advisories/28128",
        "http://secunia.com/advisories/28838",
        "http://security.gentoo.org/glsa/glsa-200711-25.xml",
        "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959",
        "http://www.debian.org/security/2007/dsa-1413",
        "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243",
        "http://www.redhat.com/support/errata/RHSA-2007-1155.html",
        "http://www.redhat.com/support/errata/RHSA-2007-1157.html",
        "http://www.securityfocus.com/bid/26353",
        "http://www.securitytracker.com/id?1018978",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2007/3903",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390",
        "https://usn.ubuntu.com/559-1/",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html",
        "http://bugs.gentoo.org/show_bug.cgi?id=198988",
        "http://bugs.mysql.com/bug.php?id=32125",
        "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html",
        "http://secunia.com/advisories/27568",
        "http://secunia.com/advisories/27649",
        "http://secunia.com/advisories/27823",
        "http://secunia.com/advisories/28025",
        "http://secunia.com/advisories/28040",
        "http://secunia.com/advisories/28099",
        "http://secunia.com/advisories/28108",
        "http://secunia.com/advisories/28128",
        "http://secunia.com/advisories/28838",
        "http://security.gentoo.org/glsa/glsa-200711-25.xml",
        "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959",
        "http://www.debian.org/security/2007/dsa-1413",
        "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243",
        "http://www.redhat.com/support/errata/RHSA-2007-1155.html",
        "http://www.redhat.com/support/errata/RHSA-2007-1157.html",
        "http://www.securityfocus.com/bid/26353",
        "http://www.securitytracker.com/id?1018978",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2007/3903",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390",
        "https://usn.ubuntu.com/559-1/",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-20"
    },
    "CVE-2008-0226": {
      "id": "CVE-2008-0226",
      "references": [
        "http://bugs.mysql.com/33814",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html",
        "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html",
        "http://secunia.com/advisories/28324",
        "http://secunia.com/advisories/28419",
        "http://secunia.com/advisories/28597",
        "http://secunia.com/advisories/29443",
        "http://secunia.com/advisories/32222",
        "http://securityreason.com/securityalert/3531",
        "http://support.apple.com/kb/HT3216",
        "http://www.debian.org/security/2008/dsa-1478",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150",
        "http://www.securityfocus.com/archive/1/485810/100/0/threaded",
        "http://www.securityfocus.com/archive/1/485811/100/0/threaded",
        "http://www.securityfocus.com/bid/27140",
        "http://www.securityfocus.com/bid/31681",
        "http://www.ubuntu.com/usn/usn-588-1",
        "http://www.vupen.com/english/advisories/2008/0560/references",
        "http://www.vupen.com/english/advisories/2008/2780",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) \"input_buffer& operator>>\" in yassl_imp.cpp.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-119"
    },
    "CVE-2008-2079": {
      "id": "CVE-2008-2079",
      "references": [
        "http://bugs.mysql.com/bug.php?id=32167",
        "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html",
        "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html",
        "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html",
        "http://secunia.com/advisories/30134",
        "http://secunia.com/advisories/31066",
        "http://secunia.com/advisories/31226",
        "http://secunia.com/advisories/31687",
        "http://secunia.com/advisories/32222",
        "http://secunia.com/advisories/32769",
        "http://secunia.com/advisories/36566",
        "http://secunia.com/advisories/36701",
        "http://support.apple.com/kb/HT3216",
        "http://support.apple.com/kb/HT3865",
        "http://www.debian.org/security/2008/dsa-1608",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2008:149",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150",
        "http://www.redhat.com/support/errata/RHSA-2008-0505.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0510.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0768.html",
        "http://www.redhat.com/support/errata/RHSA-2009-1289.html",
        "http://www.securityfocus.com/bid/29106",
        "http://www.securityfocus.com/bid/31681",
        "http://www.securitytracker.com/id?1019995",
        "http://www.ubuntu.com/usn/USN-671-1",
        "http://www.vupen.com/english/advisories/2008/1472/references",
        "http://www.vupen.com/english/advisories/2008/2780",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/42267",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133",
        "http://bugs.mysql.com/bug.php?id=32167",
        "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html",
        "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html",
        "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html",
        "http://secunia.com/advisories/30134",
        "http://secunia.com/advisories/31066",
        "http://secunia.com/advisories/31226",
        "http://secunia.com/advisories/31687",
        "http://secunia.com/advisories/32222",
        "http://secunia.com/advisories/32769",
        "http://secunia.com/advisories/36566",
        "http://secunia.com/advisories/36701",
        "http://support.apple.com/kb/HT3216",
        "http://support.apple.com/kb/HT3865",
        "http://www.debian.org/security/2008/dsa-1608",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2008:149",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150",
        "http://www.redhat.com/support/errata/RHSA-2008-0505.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0510.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0768.html",
        "http://www.redhat.com/support/errata/RHSA-2009-1289.html",
        "http://www.securityfocus.com/bid/29106",
        "http://www.securityfocus.com/bid/31681",
        "http://www.securitytracker.com/id?1019995",
        "http://www.ubuntu.com/usn/USN-671-1",
        "http://www.vupen.com/english/advisories/2008/1472/references",
        "http://www.vupen.com/english/advisories/2008/2780",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/42267",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133"
      ],
      "score": 4.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.",
      "vector_string": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-264"
    },
    "CVE-2008-3963": {
      "id": "CVE-2008-3963",
      "references": [
        "http://bugs.mysql.com/bug.php?id=35658",
        "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html",
        "http://secunia.com/advisories/31769",
        "http://secunia.com/advisories/32759",
        "http://secunia.com/advisories/32769",
        "http://secunia.com/advisories/34907",
        "http://secunia.com/advisories/36566",
        "http://www.debian.org/security/2009/dsa-1783",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094",
        "http://www.openwall.com/lists/oss-security/2008/09/09/4",
        "http://www.openwall.com/lists/oss-security/2008/09/09/7",
        "http://www.redhat.com/support/errata/RHSA-2009-1067.html",
        "http://www.redhat.com/support/errata/RHSA-2009-1289.html",
        "http://www.securitytracker.com/id?1020858",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.ubuntu.com/usn/USN-671-1",
        "http://www.vupen.com/english/advisories/2008/2554",
        "https://bugs.gentoo.org/237166",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b'' (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-134"
    },
    "CVE-2008-4098": {
      "id": "CVE-2008-4098",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25",
        "http://bugs.mysql.com/bug.php?id=32167",
        "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html",
        "http://secunia.com/advisories/32578",
        "http://secunia.com/advisories/32759",
        "http://secunia.com/advisories/32769",
        "http://secunia.com/advisories/38517",
        "http://ubuntu.com/usn/usn-897-1",
        "http://www.debian.org/security/2008/dsa-1662",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094",
        "http://www.openwall.com/lists/oss-security/2008/09/09/20",
        "http://www.openwall.com/lists/oss-security/2008/09/16/3",
        "http://www.redhat.com/support/errata/RHSA-2009-1067.html",
        "http://www.redhat.com/support/errata/RHSA-2010-0110.html",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.ubuntu.com/usn/USN-671-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/45649",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591"
      ],
      "score": 4.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.",
      "vector_string": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-59"
    },
    "CVE-2008-7247": {
      "id": "CVE-2008-7247",
      "references": [
        "http://bugs.mysql.com/bug.php?id=39277",
        "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
        "http://lists.mysql.com/commits/59711",
        "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html",
        "http://marc.info/?l=oss-security&m=125908040022018&w=2",
        "http://secunia.com/advisories/38517",
        "http://support.apple.com/kb/HT4077",
        "http://ubuntu.com/usn/usn-897-1",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:044",
        "http://www.securityfocus.com/bid/38043",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2010/1107",
        "https://bugzilla.redhat.com/show_bug.cgi?id=543619"
      ],
      "score": 6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.",
      "vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-59"
    },
    "CVE-2009-0819": {
      "id": "CVE-2009-0819",
      "references": [
        "http://bugs.mysql.com/bug.php?id=42495",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html",
        "http://secunia.com/advisories/34115",
        "http://www.securityfocus.com/bid/33972",
        "http://www.securitytracker.com/id?1021786",
        "http://www.vupen.com/english/advisories/2009/0594",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544",
        "http://bugs.mysql.com/bug.php?id=42495",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html",
        "http://secunia.com/advisories/34115",
        "http://www.securityfocus.com/bid/33972",
        "http://www.securitytracker.com/id?1021786",
        "http://www.vupen.com/english/advisories/2009/0594",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via \"an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML(),\" which triggers an assertion failure.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2009-2446": {
      "id": "CVE-2009-2446",
      "references": [
        "http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html",
        "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
        "http://secunia.com/advisories/35767",
        "http://secunia.com/advisories/36566",
        "http://secunia.com/advisories/38517",
        "http://securitytracker.com/id?1022533",
        "http://support.apple.com/kb/HT4077",
        "http://ubuntu.com/usn/usn-897-1",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2009:179",
        "http://www.osvdb.org/55734",
        "http://www.redhat.com/support/errata/RHSA-2009-1289.html",
        "http://www.redhat.com/support/errata/RHSA-2010-0110.html",
        "http://www.securityfocus.com/archive/1/504799/100/0/threaded",
        "http://www.securityfocus.com/bid/35609",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2009/1857",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/51614",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857"
      ],
      "score": 8.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request.  NOTE: some of these details are obtained from third party information.",
      "vector_string": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
      "weakness": "CWE-134"
    },
    "CVE-2009-4019": {
      "id": "CVE-2009-4019",
      "references": [
        "http://bugs.mysql.com/47780",
        "http://bugs.mysql.com/48291",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html",
        "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
        "http://marc.info/?l=oss-security&m=125881733826437&w=2",
        "http://marc.info/?l=oss-security&m=125883754215621&w=2",
        "http://marc.info/?l=oss-security&m=125901161824278&w=2",
        "http://secunia.com/advisories/37717",
        "http://secunia.com/advisories/38517",
        "http://secunia.com/advisories/38573",
        "http://support.apple.com/kb/HT4077",
        "http://ubuntu.com/usn/usn-897-1",
        "http://www.debian.org/security/2010/dsa-1997",
        "http://www.redhat.com/support/errata/RHSA-2010-0109.html",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2010/1107",
        "https://bugzilla.redhat.com/show_bug.cgi?id=540906",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11349",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8500",
        "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2009-4028": {
      "id": "CVE-2009-4028",
      "references": [
        "http://bugs.mysql.com/47320",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html",
        "http://lists.mysql.com/commits/87446",
        "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
        "http://marc.info/?l=oss-security&m=125881733826437&w=2",
        "http://www.openwall.com/lists/oss-security/2009/11/19/3",
        "http://www.openwall.com/lists/oss-security/2009/11/23/16",
        "http://www.redhat.com/support/errata/RHSA-2010-0109.html",
        "http://www.vupen.com/english/advisories/2010/1107",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510",
        "http://bugs.mysql.com/47320",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html",
        "http://lists.mysql.com/commits/87446",
        "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
        "http://marc.info/?l=oss-security&m=125881733826437&w=2",
        "http://www.openwall.com/lists/oss-security/2009/11/19/3",
        "http://www.openwall.com/lists/oss-security/2009/11/23/16",
        "http://www.redhat.com/support/errata/RHSA-2010-0109.html",
        "http://www.vupen.com/english/advisories/2010/1107",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-20"
    },
    "CVE-2010-1621": {
      "id": "CVE-2010-1621",
      "references": [
        "http://bugs.mysql.com/bug.php?id=51770",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093",
        "http://www.securityfocus.com/bid/39543",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://bugs.mysql.com/bug.php?id=51770",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093",
        "http://www.securityfocus.com/bid/39543",
        "http://www.ubuntu.com/usn/USN-1397-1"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
      "weakness": "CWE-264"
    },
    "CVE-2010-1626": {
      "id": "CVE-2010-1626",
      "references": [
        "http://bugs.mysql.com/bug.php?id=40980",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html",
        "http://securitytracker.com/id?1024004",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101",
        "http://www.openwall.com/lists/oss-security/2010/05/10/2",
        "http://www.openwall.com/lists/oss-security/2010/05/18/4",
        "http://www.redhat.com/support/errata/RHSA-2010-0442.html",
        "http://www.securityfocus.com/bid/40257",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2010/1194",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490",
        "http://bugs.mysql.com/bug.php?id=40980",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html",
        "http://securitytracker.com/id?1024004",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101",
        "http://www.openwall.com/lists/oss-security/2010/05/10/2",
        "http://www.openwall.com/lists/oss-security/2010/05/18/4",
        "http://www.redhat.com/support/errata/RHSA-2010-0442.html",
        "http://www.securityfocus.com/bid/40257",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2010/1194",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490"
      ],
      "score": 3.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.",
      "vector_string": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
      "weakness": "CWE-59"
    },
    "CVE-2010-3677": {
      "id": "CVE-2010-3677",
      "references": [
        "http://bugs.mysql.com/bug.php?id=54575",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42646",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628040",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688",
        "http://bugs.mysql.com/bug.php?id=54575",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42646",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628040",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-399"
    },
    "CVE-2010-3682": {
      "id": "CVE-2010-3682",
      "references": [
        "http://bugs.mysql.com/bug.php?id=52711",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42599",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628328",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684",
        "http://bugs.mysql.com/bug.php?id=52711",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42599",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628328",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2010-3833": {
      "id": "CVE-2010-3833",
      "references": [
        "http://bugs.mysql.com/bug.php?id=55826",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/43676",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=640751",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64845"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a \"CREATE TABLE ... SELECT.\"",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "CWE-399"
    },
    "CVE-2010-3834": {
      "id": "CVE-2010-3834",
      "references": [
        "http://bugs.mysql.com/bug.php?id=55568",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://secunia.com/advisories/42875",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223",
        "http://www.securityfocus.com/bid/43676",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=640808",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to \"materializing a derived table that required a temporary table for grouping\" and \"user variable assignments.\"",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2010-3836": {
      "id": "CVE-2010-3836",
      "references": [
        "http://bugs.mysql.com/bug.php?id=54568",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/43676",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=640845",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64842"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-399"
    },
    "CVE-2010-3837": {
      "id": "CVE-2010-3837",
      "references": [
        "http://bugs.mysql.com/bug.php?id=54476",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/43676",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=640856",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64841"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-399"
    },
    "CVE-2010-3838": {
      "id": "CVE-2010-3838",
      "references": [
        "http://bugs.mysql.com/bug.php?id=54461",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/43676",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=640858",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64840"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function's result is \"processed using an intermediate temporary table.\"",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2012-0075": {
      "id": "CVE-2012-0075",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://osvdb.org/78374",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.securityfocus.com/bid/51526",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/72539"
      ],
      "score": 1.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors.",
      "vector_string": "AV:N/AC:H/Au:M/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0087": {
      "id": "CVE-2012-0087",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://osvdb.org/78377",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.securityfocus.com/bid/51509",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/72519"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0101 and CVE-2012-0102.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0101": {
      "id": "CVE-2012-0101",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://osvdb.org/78378",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/72520"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0102": {
      "id": "CVE-2012-0102",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://osvdb.org/78379",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0101.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0114": {
      "id": "CVE-2012-0114",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.ubuntu.com/usn/USN-1397-1"
      ],
      "score": 3,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors.",
      "vector_string": "AV:L/AC:M/Au:S/C:P/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0484": {
      "id": "CVE-2012-0484",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://osvdb.org/78372",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.securityfocus.com/bid/51515",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/72525"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0490": {
      "id": "CVE-2012-0490",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://osvdb.org/78388",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.securityfocus.com/bid/51524",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/72531"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2575": {
      "id": "CVE-2015-2575",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html",
        "http://www.debian.org/security/2016/dsa-3621",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74075",
        "http://www.securitytracker.com/id/1032121",
        "https://security.netapp.com/advisory/ntap-20150417-0003/",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html",
        "http://www.debian.org/security/2016/dsa-3621",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74075",
        "http://www.securitytracker.com/id/1032121",
        "https://security.netapp.com/advisory/ntap-20150417-0003/"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.",
      "vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-1000369": {
      "id": "CVE-2017-1000369",
      "references": [
        "http://www.debian.org/security/2017/dsa-3888",
        "http://www.securityfocus.com/bid/99252",
        "http://www.securitytracker.com/id/1038779",
        "https://access.redhat.com/security/cve/CVE-2017-1000369",
        "https://github.com/Exim/exim/commit/65e061b76867a9ea7aeeb535341b790b90ae6c21",
        "https://security.gentoo.org/glsa/201709-19",
        "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
        "http://www.debian.org/security/2017/dsa-3888",
        "http://www.securityfocus.com/bid/99252",
        "http://www.securitytracker.com/id/1038779",
        "https://access.redhat.com/security/cve/CVE-2017-1000369",
        "https://github.com/Exim/exim/commit/65e061b76867a9ea7aeeb535341b790b90ae6c21",
        "https://security.gentoo.org/glsa/201709-19",
        "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
      ],
      "score": 4,
      "services": [
        "25/smtp"
      ],
      "severity": "medium",
      "summary": "Exim supports the use of multiple \"-p\" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "CWE-404"
    },
    "CVE-2017-16943": {
      "id": "CVE-2017-16943",
      "references": [
        "http://openwall.com/lists/oss-security/2017/11/25/1",
        "http://openwall.com/lists/oss-security/2017/11/25/2",
        "http://openwall.com/lists/oss-security/2017/11/25/3",
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "http://www.securitytracker.com/id/1039872",
        "https://bugs.exim.org/show_bug.cgi?id=2199",
        "https://git.exim.org/exim.git/commit/4090d62a4b25782129cc1643596dc2f6e8f63bde",
        "https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4",
        "https://github.com/LetUsFsck/PoC-Exploit-Mirror/tree/master/CVE-2017-16944",
        "https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html",
        "https://www.debian.org/security/2017/dsa-4053"
      ],
      "score": 9.8,
      "services": [
        "25/smtp"
      ],
      "severity": "critical",
      "summary": "The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2017-16944": {
      "id": "CVE-2017-16944",
      "references": [
        "http://openwall.com/lists/oss-security/2017/11/25/1",
        "http://openwall.com/lists/oss-security/2017/11/25/2",
        "http://openwall.com/lists/oss-security/2017/11/25/3",
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "http://www.securitytracker.com/id/1039873",
        "https://bugs.exim.org/show_bug.cgi?id=2201",
        "https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html",
        "https://www.debian.org/security/2017/dsa-4053",
        "https://www.exploit-db.com/exploits/43184/"
      ],
      "score": 7.5,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-835"
    },
    "CVE-2018-6789": {
      "id": "CVE-2018-6789",
      "references": [
        "http://openwall.com/lists/oss-security/2018/02/10/2",
        "http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html",
        "http://www.openwall.com/lists/oss-security/2018/02/07/2",
        "http://www.securityfocus.com/bid/103049",
        "http://www.securitytracker.com/id/1040461",
        "https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/",
        "https://exim.org/static/doc/security/CVE-2018-6789.txt",
        "https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1",
        "https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html",
        "https://usn.ubuntu.com/3565-1/",
        "https://www.debian.org/security/2018/dsa-4110",
        "https://www.exploit-db.com/exploits/44571/",
        "https://www.exploit-db.com/exploits/45671/",
        "http://openwall.com/lists/oss-security/2018/02/10/2",
        "http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html",
        "http://www.openwall.com/lists/oss-security/2018/02/07/2",
        "http://www.securityfocus.com/bid/103049",
        "http://www.securitytracker.com/id/1040461",
        "https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/",
        "https://exim.org/static/doc/security/CVE-2018-6789.txt",
        "https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1",
        "https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html",
        "https://usn.ubuntu.com/3565-1/",
        "https://www.debian.org/security/2018/dsa-4110",
        "https://www.exploit-db.com/exploits/44571/",
        "https://www.exploit-db.com/exploits/45671/"
      ],
      "score": 9.8,
      "services": [
        "25/smtp"
      ],
      "severity": "critical",
      "summary": "An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-120"
    },
    "CVE-2019-10149": {
      "id": "CVE-2019-10149",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00020.html",
        "http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html",
        "http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html",
        "http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html",
        "http://seclists.org/fulldisclosure/2019/Jun/16",
        "http://www.openwall.com/lists/oss-security/2019/06/05/2",
        "http://www.openwall.com/lists/oss-security/2019/06/05/3",
        "http://www.openwall.com/lists/oss-security/2019/06/05/4",
        "http://www.openwall.com/lists/oss-security/2019/06/06/1",
        "http://www.openwall.com/lists/oss-security/2019/07/25/6",
        "http://www.openwall.com/lists/oss-security/2019/07/25/7",
        "http://www.openwall.com/lists/oss-security/2019/07/26/4",
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "http://www.securityfocus.com/bid/108679",
        "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149",
        "https://seclists.org/bugtraq/2019/Jun/5",
        "https://security.gentoo.org/glsa/201906-01",
        "https://usn.ubuntu.com/4010-1/",
        "https://www.debian.org/security/2019/dsa-4456",
        "https://www.exim.org/static/doc/security/CVE-2019-10149.txt",
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00020.html",
        "http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html",
        "http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html",
        "http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html",
        "http://seclists.org/fulldisclosure/2019/Jun/16",
        "http://www.openwall.com/lists/oss-security/2019/06/05/2",
        "http://www.openwall.com/lists/oss-security/2019/06/05/3",
        "http://www.openwall.com/lists/oss-security/2019/06/05/4",
        "http://www.openwall.com/lists/oss-security/2019/06/06/1",
        "http://www.openwall.com/lists/oss-security/2019/07/25/6",
        "http://www.openwall.com/lists/oss-security/2019/07/25/7",
        "http://www.openwall.com/lists/oss-security/2019/07/26/4",
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "http://www.securityfocus.com/bid/108679",
        "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149",
        "https://seclists.org/bugtraq/2019/Jun/5",
        "https://security.gentoo.org/glsa/201906-01",
        "https://usn.ubuntu.com/4010-1/",
        "https://www.debian.org/security/2019/dsa-4456",
        "https://www.exim.org/static/doc/security/CVE-2019-10149.txt"
      ],
      "score": 9.8,
      "services": [
        "25/smtp"
      ],
      "severity": "critical",
      "summary": "A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-78"
    },
    "CVE-2019-13917": {
      "id": "CVE-2019-13917",
      "references": [
        "http://exim.org/static/doc/security/CVE-2019-13917.txt",
        "http://www.openwall.com/lists/oss-security/2019/07/26/5",
        "https://seclists.org/bugtraq/2019/Jul/51",
        "https://security.gentoo.org/glsa/201909-06",
        "https://www.debian.org/security/2019/dsa-4488",
        "http://exim.org/static/doc/security/CVE-2019-13917.txt",
        "http://www.openwall.com/lists/oss-security/2019/07/26/5",
        "https://seclists.org/bugtraq/2019/Jul/51",
        "https://security.gentoo.org/glsa/201909-06",
        "https://www.debian.org/security/2019/dsa-4488"
      ],
      "score": 9.8,
      "services": [
        "25/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-19"
    },
    "CVE-2019-15846": {
      "id": "CVE-2019-15846",
      "references": [
        "http://exim.org/static/doc/security/CVE-2019-15846.txt",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html",
        "http://www.openwall.com/lists/oss-security/2019/09/06/2",
        "http://www.openwall.com/lists/oss-security/2019/09/06/4",
        "http://www.openwall.com/lists/oss-security/2019/09/06/5",
        "http://www.openwall.com/lists/oss-security/2019/09/06/6",
        "http://www.openwall.com/lists/oss-security/2019/09/06/8",
        "http://www.openwall.com/lists/oss-security/2019/09/07/1",
        "http://www.openwall.com/lists/oss-security/2019/09/07/2",
        "http://www.openwall.com/lists/oss-security/2019/09/08/1",
        "http://www.openwall.com/lists/oss-security/2019/09/09/1",
        "https://exim.org/static/doc/security/CVE-2019-15846.txt",
        "https://lists.debian.org/debian-lts-announce/2019/09/msg00004.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FT3GY7V7SR2RHKNZNQCGXFWUSILVSZNU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDF37AUNETIOXY6ZLQAUBGBVUTMMV242/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBNHDAF74RI6VK2JVSEIE3VYNL7JJDYM/",
        "https://seclists.org/bugtraq/2019/Sep/13",
        "https://security.gentoo.org/glsa/201909-06",
        "https://usn.ubuntu.com/4124-1/",
        "https://usn.ubuntu.com/4124-2/",
        "https://www.debian.org/security/2019/dsa-4517",
        "https://www.kb.cert.org/vuls/id/672565",
        "https://www.openwall.com/lists/oss-security/2019/09/06/1",
        "http://exim.org/static/doc/security/CVE-2019-15846.txt",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html",
        "http://www.openwall.com/lists/oss-security/2019/09/06/2",
        "http://www.openwall.com/lists/oss-security/2019/09/06/4",
        "http://www.openwall.com/lists/oss-security/2019/09/06/5",
        "http://www.openwall.com/lists/oss-security/2019/09/06/6",
        "http://www.openwall.com/lists/oss-security/2019/09/06/8",
        "http://www.openwall.com/lists/oss-security/2019/09/07/1",
        "http://www.openwall.com/lists/oss-security/2019/09/07/2",
        "http://www.openwall.com/lists/oss-security/2019/09/08/1",
        "http://www.openwall.com/lists/oss-security/2019/09/09/1",
        "https://exim.org/static/doc/security/CVE-2019-15846.txt",
        "https://lists.debian.org/debian-lts-announce/2019/09/msg00004.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FT3GY7V7SR2RHKNZNQCGXFWUSILVSZNU/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDF37AUNETIOXY6ZLQAUBGBVUTMMV242/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBNHDAF74RI6VK2JVSEIE3VYNL7JJDYM/",
        "https://seclists.org/bugtraq/2019/Sep/13",
        "https://security.gentoo.org/glsa/201909-06",
        "https://usn.ubuntu.com/4124-1/",
        "https://usn.ubuntu.com/4124-2/",
        "https://www.debian.org/security/2019/dsa-4517",
        "https://www.kb.cert.org/vuls/id/672565",
        "https://www.openwall.com/lists/oss-security/2019/09/06/1"
      ],
      "score": 9.8,
      "services": [
        "25/smtp"
      ],
      "severity": "critical",
      "summary": "Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-12783": {
      "id": "CVE-2020-12783",
      "references": [
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "https://bugs.exim.org/show_bug.cgi?id=2571",
        "https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86",
        "https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0",
        "https://lists.debian.org/debian-lts-announce/2020/05/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6IQQ2SERFUD4WMRSX6XYDNK7Q4GPT7Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7Z5UG6ZIG32V7M4PP3BCC65C27EWK7G/",
        "https://usn.ubuntu.com/4366-1/",
        "https://www.debian.org/security/2020/dsa-4687",
        "http://www.openwall.com/lists/oss-security/2021/05/04/7",
        "https://bugs.exim.org/show_bug.cgi?id=2571",
        "https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86",
        "https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0",
        "https://lists.debian.org/debian-lts-announce/2020/05/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6IQQ2SERFUD4WMRSX6XYDNK7Q4GPT7Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7Z5UG6ZIG32V7M4PP3BCC65C27EWK7G/",
        "https://usn.ubuntu.com/4366-1/",
        "https://www.debian.org/security/2020/dsa-4687"
      ],
      "score": 7.5,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-125"
    },
    "CVE-2020-28007": {
      "id": "CVE-2020-28007",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt"
      ],
      "score": 7.8,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-59"
    },
    "CVE-2020-28008": {
      "id": "CVE-2020-28008",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt"
      ],
      "score": 7.8,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-269"
    },
    "CVE-2020-28009": {
      "id": "CVE-2020-28009",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt"
      ],
      "score": 7.8,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days).",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2020-28010": {
      "id": "CVE-2020-28010",
      "references": [
        "http://www.openwall.com/lists/oss-security/2021/07/22/7",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt",
        "http://www.openwall.com/lists/oss-security/2021/07/22/7",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt"
      ],
      "score": 7.8,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28011": {
      "id": "CVE-2020-28011",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt"
      ],
      "score": 7.8,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28012": {
      "id": "CVE-2020-28012",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt"
      ],
      "score": 7.8,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-28013": {
      "id": "CVE-2020-28013",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt"
      ],
      "score": 7.8,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles \"-F '.('\" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28014": {
      "id": "CVE-2020-28014",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt"
      ],
      "score": 6.1,
      "services": [
        "25/smtp"
      ],
      "severity": "medium",
      "summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
      "weakness": "CWE-269"
    },
    "CVE-2020-28015": {
      "id": "CVE-2020-28015",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt"
      ],
      "score": 7.8,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-28016": {
      "id": "CVE-2020-28016",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt"
      ],
      "score": 7.8,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because \"-F ''\" is mishandled by parse_fix_phrase.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28017": {
      "id": "CVE-2020-28017",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt"
      ],
      "score": 9.8,
      "services": [
        "25/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2020-28019": {
      "id": "CVE-2020-28019",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt"
      ],
      "score": 7.5,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-665"
    },
    "CVE-2020-28020": {
      "id": "CVE-2020-28020",
      "references": [
        "http://www.openwall.com/lists/oss-security/2021/07/25/1",
        "http://www.openwall.com/lists/oss-security/2021/08/03/1",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28020-HSIZE.txt",
        "http://www.openwall.com/lists/oss-security/2021/07/25/1",
        "http://www.openwall.com/lists/oss-security/2021/08/03/1",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28020-HSIZE.txt"
      ],
      "score": 9.8,
      "services": [
        "25/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2020-28021": {
      "id": "CVE-2020-28021",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt"
      ],
      "score": 8.8,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-28022": {
      "id": "CVE-2020-28022",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt"
      ],
      "score": 9.8,
      "services": [
        "25/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28023": {
      "id": "CVE-2020-28023",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt"
      ],
      "score": 7.5,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-125"
    },
    "CVE-2020-28024": {
      "id": "CVE-2020-28024",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt"
      ],
      "score": 9.8,
      "services": [
        "25/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2020-28025": {
      "id": "CVE-2020-28025",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt"
      ],
      "score": 7.5,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-125"
    },
    "CVE-2020-28026": {
      "id": "CVE-2020-28026",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt"
      ],
      "score": 9.8,
      "services": [
        "25/smtp"
      ],
      "severity": "critical",
      "summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-8015": {
      "id": "CVE-2020-8015",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00010.html",
        "https://bugzilla.suse.com/show_bug.cgi?id=1154183",
        "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00010.html",
        "https://bugzilla.suse.com/show_bug.cgi?id=1154183"
      ],
      "score": 8.4,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-59"
    },
    "CVE-2021-27216": {
      "id": "CVE-2021-27216",
      "references": [
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
        "https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt"
      ],
      "score": 6.3,
      "services": [
        "25/smtp"
      ],
      "severity": "medium",
      "summary": "Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
      "weakness": "CWE-362"
    },
    "CVE-2021-38371": {
      "id": "CVE-2021-38371",
      "references": [
        "https://nostarttls.secvuln.info",
        "https://www.exim.org",
        "https://www.exim.org/static/doc/security/CVE-2021-38371.txt",
        "https://nostarttls.secvuln.info",
        "https://www.exim.org",
        "https://www.exim.org/static/doc/security/CVE-2021-38371.txt"
      ],
      "score": 7.5,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-74"
    },
    "CVE-2022-37451": {
      "id": "CVE-2022-37451",
      "references": [
        "https://cwe.mitre.org/data/definitions/762.html",
        "https://github.com/Exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42",
        "https://github.com/Exim/exim/compare/exim-4.95...exim-4.96",
        "https://github.com/Exim/exim/wiki/EximSecurity",
        "https://github.com/ivd38/exim_invalid_free",
        "https://lists.exim.org/lurker/message/20220625.141825.d6de6074.en.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LETR5CVDPFOFQHXCJP6NFLG52JZHQYDY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XSWDF4QEXD4TDWQLYQOWCHBJKTDQR4Z7/",
        "https://www.exim.org/static/doc/security/",
        "https://www.openwall.com/lists/oss-security/2022/08/06/1",
        "https://cwe.mitre.org/data/definitions/762.html",
        "https://github.com/Exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42",
        "https://github.com/Exim/exim/compare/exim-4.95...exim-4.96",
        "https://github.com/Exim/exim/wiki/EximSecurity",
        "https://github.com/ivd38/exim_invalid_free",
        "https://lists.exim.org/lurker/message/20220625.141825.d6de6074.en.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LETR5CVDPFOFQHXCJP6NFLG52JZHQYDY/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XSWDF4QEXD4TDWQLYQOWCHBJKTDQR4Z7/",
        "https://www.exim.org/static/doc/security/",
        "https://www.openwall.com/lists/oss-security/2022/08/06/1"
      ],
      "score": 7.5,
      "services": [
        "25/smtp"
      ],
      "severity": "high",
      "summary": "Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-763"
    },
    "CVE-2022-37452": {
      "id": "CVE-2022-37452",
      "references": [
        "https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743",
        "https://github.com/Exim/exim/compare/exim-4.94...exim-4.95",
        "https://github.com/Exim/exim/wiki/EximSecurity",
        "https://github.com/ivd38/exim_overflow",
        "https://lists.debian.org/debian-lts-announce/2022/08/msg00014.html",
        "https://www.exim.org/static/doc/security/",
        "https://www.openwall.com/lists/oss-security/2022/08/06/8",
        "https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743",
        "https://github.com/Exim/exim/compare/exim-4.94...exim-4.95",
        "https://github.com/Exim/exim/wiki/EximSecurity",
        "https://github.com/ivd38/exim_overflow",
        "https://lists.debian.org/debian-lts-announce/2022/08/msg00014.html",
        "https://www.exim.org/static/doc/security/",
        "https://www.openwall.com/lists/oss-security/2022/08/06/8"
      ],
      "score": 9.8,
      "services": [
        "25/smtp"
      ],
      "severity": "critical",
      "summary": "Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2023-51766": {
      "id": "CVE-2023-51766",
      "references": [
        "http://www.openwall.com/lists/oss-security/2023/12/24/1",
        "http://www.openwall.com/lists/oss-security/2023/12/25/1",
        "http://www.openwall.com/lists/oss-security/2023/12/29/2",
        "http://www.openwall.com/lists/oss-security/2024/01/01/1",
        "http://www.openwall.com/lists/oss-security/2024/01/01/2",
        "http://www.openwall.com/lists/oss-security/2024/01/01/3",
        "https://bugs.exim.org/show_bug.cgi?id=3063",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255852",
        "https://exim.org/static/doc/security/CVE-2023-51766.txt",
        "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html",
        "https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca",
        "https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5",
        "https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/",
        "https://lwn.net/Articles/956533/",
        "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/",
        "https://www.openwall.com/lists/oss-security/2023/12/23/2",
        "https://www.youtube.com/watch?v=V8KPV96g1To",
        "http://www.openwall.com/lists/oss-security/2023/12/24/1",
        "http://www.openwall.com/lists/oss-security/2023/12/25/1",
        "http://www.openwall.com/lists/oss-security/2023/12/29/2",
        "http://www.openwall.com/lists/oss-security/2024/01/01/1",
        "http://www.openwall.com/lists/oss-security/2024/01/01/2",
        "http://www.openwall.com/lists/oss-security/2024/01/01/3",
        "https://bugs.exim.org/show_bug.cgi?id=3063",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255852",
        "https://exim.org/static/doc/security/CVE-2023-51766.txt",
        "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html",
        "https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca",
        "https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5",
        "https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/",
        "https://lwn.net/Articles/956533/",
        "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/",
        "https://www.openwall.com/lists/oss-security/2023/12/23/2",
        "https://www.youtube.com/watch?v=V8KPV96g1To"
      ],
      "score": 5.3,
      "services": [
        "25/smtp"
      ],
      "severity": "medium",
      "summary": "Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "CWE-345"
    }
  }
}