Exim versions prior to 4.90.1 remote buffer overflow proof of concept exploit.
ee8228224f1f993d6d2342e211a9be7a153342208313db672c854f83eba4d705
Exim version 4.90 remote code execution exploit.
19a743e6423b65998debf24be560524e381d039e1cadcd20d9257dd956d9b4a1
Exim versions prior to 4.90.1 suffer from a base64d remote code execution vulnerability.
7ca9d4d2ad8a8f94f402c2a0986a1bcb33596bff697621e2afcde815f2f4b0d8
Gentoo Linux Security Advisory 201803-1 - Multiple vulnerabilities have been found in Exim, the worst of which allows remote attackers to execute arbitrary code. Versions less than 4.90.1 are affected.
fae08f3a967abdc43a1c026ad3ce23d707d739eacf930009ae729881c47b4e5c
Ubuntu Security Notice 3565-1 - Meh Chang discovered that Exim incorrectly handled memory in certain decoding operations. A remote attacker could use this issue to cause Exim to crash, resulting in a denial of service, or possibly execute arbitrary code.
af6290b7d81b5f37c8718f3ea211ac9f5fe0e3ba2706920599cde51286c5524b
Debian Linux Security Advisory 4110-1 - Meh Chang discovered a buffer overflow flaw in a utility function used in the SMTP listener of Exim, a mail transport agent. A remote attacker can take advantage of this flaw to cause a denial of service, or potentially the execution of arbitrary code via a specially crafted message.
177e2fda59e9e6ba3a12f1c8d564ad42a8ca0e3bef74df674862b69bd02f1f54