CVE-2023-42115 reserved by organization for new security problem
Reporter | Title | Published | Views | Family All 50 |
---|---|---|---|---|
![]() | (0Day) Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability | 27 Sep 202300:00 | – | zdi |
![]() | CVE-2023-42115 Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability | 3 May 202402:13 | – | cvelist |
![]() | CGA-C42F-MXV5-3G6H | 6 Jun 202412:25 | – | osv |
![]() | CVE-2023-42115 | 3 May 202403:15 | – | osv |
![]() | OPENSUSE-SU-2024:13282-1 exim-4.96.1-1.1 on GA media | 15 Jun 202400:00 | – | osv |
![]() | exim4 - security update | 2 Oct 202300:00 | – | osv |
![]() | exim4 vulnerabilities | 4 Oct 202313:41 | – | osv |
![]() | CVE-2023-42115 | 3 May 202403:15 | – | nvd |
![]() | Exploit for CVE-2023-42115 | 2 Sep 202409:30 | – | githubexploit |
![]() | Exploit for CVE-2023-42115 | 18 Feb 202410:07 | – | githubexploit |
[
{
"vendor": "Exim",
"product": "Exim",
"versions": [
{
"version": "exim 4.95",
"status": "affected"
}
],
"defaultStatus": "unknown"
}
]
Source | Link |
---|---|
zerodayinitiative | www.zerodayinitiative.com/advisories/ZDI-23-1469/ |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
target_ip | request body | /path/to/payload.sh | CVE-2023-42115 allows remote code execution via an Exim vulnerability by improperly handling user-supplied data. | CWE-787 |
target_port | request body | /path/to/payload.sh | CVE-2023-42115 allows remote code execution via an Exim vulnerability by improperly handling user-supplied data. | CWE-787 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo