Exim packages fixed a buffer overflow vulnerability allowing arbitrary code execution via IPv6.
Reporter | Title | Published | Views | Family All 33 |
---|---|---|---|---|
![]() | Debian: Security Advisory (DSA-637-1) | 17 Jan 200800:00 | – | openvas |
![]() | Debian Security Advisory DSA 635-1 (exim) | 17 Jan 200800:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-635-1) | 17 Jan 200800:00 | – | openvas |
![]() | Debian Security Advisory DSA 637-1 (exim-tls) | 17 Jan 200800:00 | – | openvas |
![]() | exim -- two buffer overflow vulnerabilities | 4 Sep 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200501-23 (exim) | 24 Sep 200800:00 | – | openvas |
![]() | exim -- two buffer overflow vulnerabilities | 4 Sep 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200501-23 (exim) | 24 Sep 200800:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-56-1) | 26 Aug 202200:00 | – | openvas |
![]() | iDEFENSE Security Advisory [IDEF0725] Exim host_aton() Buffer Overflow Vulnerability | 8 Jan 200500:00 | – | securityvulns |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3 | powerpc | eximon | 3.35-1woody4 | eximon_3.35-1woody4_powerpc.deb |
Debian | 3 | mips | eximon | 3.35-1woody4 | eximon_3.35-1woody4_mips.deb |
Debian | 3 | mipsel | exim-tls | 3.35-3woody3 | exim-tls_3.35-3woody3_mipsel.deb |
Debian | 3 | m68k | exim-tls | 3.35-3woody3 | exim-tls_3.35-3woody3_m68k.deb |
Debian | 3 | s390 | exim-tls | 3.35-3woody3 | exim-tls_3.35-3woody3_s390.deb |
Debian | 3 | i386 | exim | 3.35-1woody4 | exim_3.35-1woody4_i386.deb |
Debian | 3 | hppa | exim-tls | 3.35-3woody3 | exim-tls_3.35-3woody3_hppa.deb |
Debian | 3 | mips | exim | 3.35-1woody4 | exim_3.35-1woody4_mips.deb |
Debian | 3 | powerpc | exim-tls | 3.35-3woody3 | exim-tls_3.35-3woody3_powerpc.deb |
Debian | 3 | hppa | eximon | 3.35-1woody4 | eximon_3.35-1woody4_hppa.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo