9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.197 Low
EPSS
Percentile
96.3%
Severity: Critical
Date : 2019-09-06
CVE-ID : CVE-2019-15846
Package : exim
Type : arbitrary command execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1037
The package exim before version 4.92.2-1 is vulnerable to arbitrary
command execution.
Upgrade to 4.92.2-1.
The problem has been fixed upstream in version 4.92.2.
None.
Exim before 4.92.2 allows remote attackers to execute arbitrary code as
root via a trailing backslash.
A remote attacker is able to execute arbitrary commands with root
privileges.
https://exim.org/static/doc/security/CVE-2019-15846.txt
https://security.archlinux.org/CVE-2019-15846
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.197 Low
EPSS
Percentile
96.3%