Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/exim4@4.99.1-1?distro=trixie
Typedeb
Namespacedebian
Nameexim4
Version4.99.1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1ev3-fe86-93e3
vulnerability_id VCID-1ev3-fe86-93e3
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28022
reference_id
reference_type
scores
0
value 0.0201
scoring_system epss
scoring_elements 0.83645
published_at 2026-04-02T12:55:00Z
1
value 0.0201
scoring_system epss
scoring_elements 0.8366
published_at 2026-04-04T12:55:00Z
2
value 0.0201
scoring_system epss
scoring_elements 0.83632
published_at 2026-04-01T12:55:00Z
3
value 0.02179
scoring_system epss
scoring_elements 0.84337
published_at 2026-04-09T12:55:00Z
4
value 0.02179
scoring_system epss
scoring_elements 0.84355
published_at 2026-04-11T12:55:00Z
5
value 0.02179
scoring_system epss
scoring_elements 0.84347
published_at 2026-04-12T12:55:00Z
6
value 0.02179
scoring_system epss
scoring_elements 0.84344
published_at 2026-04-13T12:55:00Z
7
value 0.02179
scoring_system epss
scoring_elements 0.84366
published_at 2026-04-18T12:55:00Z
8
value 0.02179
scoring_system epss
scoring_elements 0.84369
published_at 2026-04-21T12:55:00Z
9
value 0.02179
scoring_system epss
scoring_elements 0.8431
published_at 2026-04-07T12:55:00Z
10
value 0.02179
scoring_system epss
scoring_elements 0.84331
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28022
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
21
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28022
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ev3-fe86-93e3
1
url VCID-1kpw-zhj4-jfaz
vulnerability_id VCID-1kpw-zhj4-jfaz
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28026
reference_id
reference_type
scores
0
value 0.03938
scoring_system epss
scoring_elements 0.88309
published_at 2026-04-04T12:55:00Z
1
value 0.03938
scoring_system epss
scoring_elements 0.88286
published_at 2026-04-01T12:55:00Z
2
value 0.03938
scoring_system epss
scoring_elements 0.88294
published_at 2026-04-02T12:55:00Z
3
value 0.0426
scoring_system epss
scoring_elements 0.88813
published_at 2026-04-09T12:55:00Z
4
value 0.0426
scoring_system epss
scoring_elements 0.88791
published_at 2026-04-07T12:55:00Z
5
value 0.0426
scoring_system epss
scoring_elements 0.88808
published_at 2026-04-08T12:55:00Z
6
value 0.0426
scoring_system epss
scoring_elements 0.88834
published_at 2026-04-16T12:55:00Z
7
value 0.0426
scoring_system epss
scoring_elements 0.88832
published_at 2026-04-18T12:55:00Z
8
value 0.0426
scoring_system epss
scoring_elements 0.88825
published_at 2026-04-11T12:55:00Z
9
value 0.0426
scoring_system epss
scoring_elements 0.8882
published_at 2026-04-13T12:55:00Z
10
value 0.04287
scoring_system epss
scoring_elements 0.88867
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28026
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
21
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28026
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1kpw-zhj4-jfaz
2
url VCID-1tqm-3s38-fqcn
vulnerability_id VCID-1tqm-3s38-fqcn
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27216
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17934
published_at 2026-04-21T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17943
published_at 2026-04-13T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17886
published_at 2026-04-16T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17897
published_at 2026-04-18T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17873
published_at 2026-04-07T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17961
published_at 2026-04-08T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.18022
published_at 2026-04-09T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.18038
published_at 2026-04-11T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17993
published_at 2026-04-12T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21308
published_at 2026-04-02T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21364
published_at 2026-04-04T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21156
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27216
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27216
2
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
3
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
4
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2021-27216
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1tqm-3s38-fqcn
3
url VCID-2qea-x4nk-zfba
vulnerability_id VCID-2qea-x4nk-zfba
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url http://exim.org/static/doc/security/CVE-2019-15846.txt
reference_id
reference_type
scores
url http://exim.org/static/doc/security/CVE-2019-15846.txt
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15846.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15846.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15846
reference_id
reference_type
scores
0
value 0.63989
scoring_system epss
scoring_elements 0.98437
published_at 2026-04-16T12:55:00Z
1
value 0.63989
scoring_system epss
scoring_elements 0.98436
published_at 2026-04-18T12:55:00Z
2
value 0.63989
scoring_system epss
scoring_elements 0.98432
published_at 2026-04-13T12:55:00Z
3
value 0.63989
scoring_system epss
scoring_elements 0.98433
published_at 2026-04-12T12:55:00Z
4
value 0.6448
scoring_system epss
scoring_elements 0.98448
published_at 2026-04-08T12:55:00Z
5
value 0.6448
scoring_system epss
scoring_elements 0.9845
published_at 2026-04-09T12:55:00Z
6
value 0.6448
scoring_system epss
scoring_elements 0.98458
published_at 2026-04-21T12:55:00Z
7
value 0.6448
scoring_system epss
scoring_elements 0.98438
published_at 2026-04-01T12:55:00Z
8
value 0.6448
scoring_system epss
scoring_elements 0.9844
published_at 2026-04-02T12:55:00Z
9
value 0.6448
scoring_system epss
scoring_elements 0.98443
published_at 2026-04-04T12:55:00Z
10
value 0.6448
scoring_system epss
scoring_elements 0.98445
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15846
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15846
5
reference_url https://exim.org/static/doc/security/CVE-2019-15846.txt
reference_id
reference_type
scores
url https://exim.org/static/doc/security/CVE-2019-15846.txt
6
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00004.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FT3GY7V7SR2RHKNZNQCGXFWUSILVSZNU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FT3GY7V7SR2RHKNZNQCGXFWUSILVSZNU/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDF37AUNETIOXY6ZLQAUBGBVUTMMV242/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDF37AUNETIOXY6ZLQAUBGBVUTMMV242/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBNHDAF74RI6VK2JVSEIE3VYNL7JJDYM/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBNHDAF74RI6VK2JVSEIE3VYNL7JJDYM/
10
reference_url https://seclists.org/bugtraq/2019/Sep/13
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Sep/13
11
reference_url https://www.debian.org/security/2019/dsa-4517
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4517
12
reference_url https://www.kb.cert.org/vuls/id/672565
reference_id
reference_type
scores
url https://www.kb.cert.org/vuls/id/672565
13
reference_url https://www.openwall.com/lists/oss-security/2019/09/06/1
reference_id
reference_type
scores
url https://www.openwall.com/lists/oss-security/2019/09/06/1
14
reference_url http://www.openwall.com/lists/oss-security/2019/09/06/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/09/06/2
15
reference_url http://www.openwall.com/lists/oss-security/2019/09/06/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/09/06/4
16
reference_url http://www.openwall.com/lists/oss-security/2019/09/06/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/09/06/5
17
reference_url http://www.openwall.com/lists/oss-security/2019/09/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/09/06/6
18
reference_url http://www.openwall.com/lists/oss-security/2019/09/06/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/09/06/8
19
reference_url http://www.openwall.com/lists/oss-security/2019/09/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/09/07/1
20
reference_url http://www.openwall.com/lists/oss-security/2019/09/07/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/09/07/2
21
reference_url http://www.openwall.com/lists/oss-security/2019/09/08/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/09/08/1
22
reference_url http://www.openwall.com/lists/oss-security/2019/09/09/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/09/09/1
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1748397
reference_id 1748397
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1748397
24
reference_url https://security.archlinux.org/ASA-201909-3
reference_id ASA-201909-3
reference_type
scores
url https://security.archlinux.org/ASA-201909-3
25
reference_url https://security.archlinux.org/AVG-1037
reference_id AVG-1037
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1037
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15846
reference_id CVE-2019-15846
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15846
31
reference_url https://security.gentoo.org/glsa/201909-06
reference_id GLSA-201909-06
reference_type
scores
url https://security.gentoo.org/glsa/201909-06
32
reference_url https://usn.ubuntu.com/4124-1/
reference_id USN-4124-1
reference_type
scores
url https://usn.ubuntu.com/4124-1/
33
reference_url https://usn.ubuntu.com/4124-2/
reference_id USN-4124-2
reference_type
scores
url https://usn.ubuntu.com/4124-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.92.1-3?distro=trixie
purl pkg:deb/debian/exim4@4.92.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.92.1-3%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2019-15846
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2qea-x4nk-zfba
4
url VCID-3z7r-efh2-tyf9
vulnerability_id VCID-3z7r-efh2-tyf9
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28021
reference_id
reference_type
scores
0
value 0.06476
scoring_system epss
scoring_elements 0.91111
published_at 2026-04-21T12:55:00Z
1
value 0.06476
scoring_system epss
scoring_elements 0.91075
published_at 2026-04-09T12:55:00Z
2
value 0.06476
scoring_system epss
scoring_elements 0.91084
published_at 2026-04-11T12:55:00Z
3
value 0.06476
scoring_system epss
scoring_elements 0.91085
published_at 2026-04-13T12:55:00Z
4
value 0.06476
scoring_system epss
scoring_elements 0.91109
published_at 2026-04-18T12:55:00Z
5
value 0.06476
scoring_system epss
scoring_elements 0.91057
published_at 2026-04-07T12:55:00Z
6
value 0.06476
scoring_system epss
scoring_elements 0.91069
published_at 2026-04-08T12:55:00Z
7
value 0.07645
scoring_system epss
scoring_elements 0.91855
published_at 2026-04-02T12:55:00Z
8
value 0.07645
scoring_system epss
scoring_elements 0.91862
published_at 2026-04-04T12:55:00Z
9
value 0.07645
scoring_system epss
scoring_elements 0.91847
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28021
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28021
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3z7r-efh2-tyf9
5
url VCID-55h7-dczu-rfhe
vulnerability_id VCID-55h7-dczu-rfhe
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42115.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42115.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42115
reference_id
reference_type
scores
0
value 0.70686
scoring_system epss
scoring_elements 0.98701
published_at 2026-04-21T12:55:00Z
1
value 0.70686
scoring_system epss
scoring_elements 0.98695
published_at 2026-04-11T12:55:00Z
2
value 0.70686
scoring_system epss
scoring_elements 0.98696
published_at 2026-04-12T12:55:00Z
3
value 0.70686
scoring_system epss
scoring_elements 0.98697
published_at 2026-04-13T12:55:00Z
4
value 0.70686
scoring_system epss
scoring_elements 0.987
published_at 2026-04-16T12:55:00Z
5
value 0.70686
scoring_system epss
scoring_elements 0.98691
published_at 2026-04-07T12:55:00Z
6
value 0.70686
scoring_system epss
scoring_elements 0.98692
published_at 2026-04-08T12:55:00Z
7
value 0.70686
scoring_system epss
scoring_elements 0.98693
published_at 2026-04-09T12:55:00Z
8
value 0.72904
scoring_system epss
scoring_elements 0.98772
published_at 2026-04-04T12:55:00Z
9
value 0.72904
scoring_system epss
scoring_elements 0.98769
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42115
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42116
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241525
reference_id 2241525
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241525
6
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
7
reference_url https://usn.ubuntu.com/6411-1/
reference_id USN-6411-1
reference_type
scores
url https://usn.ubuntu.com/6411-1/
8
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-1469/
reference_id ZDI-23-1469
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-09-20T19:32:20Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-1469/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.97~RC1-2?distro=trixie
purl pkg:deb/debian/exim4@4.97~RC1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.97~RC1-2%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
6
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2023-42115
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55h7-dczu-rfhe
6
url VCID-56xq-sgry-2uhd
vulnerability_id VCID-56xq-sgry-2uhd
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6789.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6789.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6789
reference_id
reference_type
scores
0
value 0.86439
scoring_system epss
scoring_elements 0.99413
published_at 2026-04-21T12:55:00Z
1
value 0.86439
scoring_system epss
scoring_elements 0.99404
published_at 2026-04-01T12:55:00Z
2
value 0.86439
scoring_system epss
scoring_elements 0.99403
published_at 2026-04-02T12:55:00Z
3
value 0.86439
scoring_system epss
scoring_elements 0.99405
published_at 2026-04-04T12:55:00Z
4
value 0.86439
scoring_system epss
scoring_elements 0.99406
published_at 2026-04-07T12:55:00Z
5
value 0.86439
scoring_system epss
scoring_elements 0.99407
published_at 2026-04-08T12:55:00Z
6
value 0.86439
scoring_system epss
scoring_elements 0.99408
published_at 2026-04-09T12:55:00Z
7
value 0.86439
scoring_system epss
scoring_elements 0.99409
published_at 2026-04-11T12:55:00Z
8
value 0.86439
scoring_system epss
scoring_elements 0.9941
published_at 2026-04-12T12:55:00Z
9
value 0.86439
scoring_system epss
scoring_elements 0.99411
published_at 2026-04-13T12:55:00Z
10
value 0.86439
scoring_system epss
scoring_elements 0.99414
published_at 2026-04-16T12:55:00Z
11
value 0.86439
scoring_system epss
scoring_elements 0.99412
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6789
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6789
3
reference_url http://www.securityfocus.com/bid/103049
reference_id 103049
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/
url http://www.securityfocus.com/bid/103049
4
reference_url http://www.securitytracker.com/id/1040461
reference_id 1040461
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/
url http://www.securitytracker.com/id/1040461
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1543268
reference_id 1543268
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1543268
6
reference_url http://openwall.com/lists/oss-security/2018/02/10/2
reference_id 2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/
url http://openwall.com/lists/oss-security/2018/02/10/2
7
reference_url http://www.openwall.com/lists/oss-security/2018/02/07/2
reference_id 2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/
url http://www.openwall.com/lists/oss-security/2018/02/07/2
8
reference_url https://www.exploit-db.com/exploits/44571/
reference_id 44571
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/
url https://www.exploit-db.com/exploits/44571/
9
reference_url https://www.exploit-db.com/exploits/45671/
reference_id 45671
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/
url https://www.exploit-db.com/exploits/45671/
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890000
reference_id 890000
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890000
11
reference_url https://security.archlinux.org/ASA-201802-6
reference_id ASA-201802-6
reference_type
scores
url https://security.archlinux.org/ASA-201802-6
12
reference_url https://security.archlinux.org/AVG-608
reference_id AVG-608
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-608
13
reference_url https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1
reference_id cf3cd306062a08969c41a1cdd32c6855f1abecf1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/
url https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/44571.py
reference_id CVE-2018-6789
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/44571.py
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45671.py
reference_id CVE-2018-6789
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45671.py
16
reference_url https://medium.com/@straightblast426/my-poc-walk-through-for-cve-2018-6789-2e402e4ff588
reference_id CVE-2018-6789
reference_type exploit
scores
url https://medium.com/@straightblast426/my-poc-walk-through-for-cve-2018-6789-2e402e4ff588
17
reference_url https://exim.org/static/doc/security/CVE-2018-6789.txt
reference_id CVE-2018-6789.txt
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/
url https://exim.org/static/doc/security/CVE-2018-6789.txt
18
reference_url https://www.debian.org/security/2018/dsa-4110
reference_id dsa-4110
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/
url https://www.debian.org/security/2018/dsa-4110
19
reference_url http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
reference_id Exim-base64d-Buffer-Overflow.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/
url http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
20
reference_url https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/
reference_id exim-off-by-one-RCE-exploiting-CVE-2018-6789-en
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/
url https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/
21
reference_url https://security.gentoo.org/glsa/201803-01
reference_id GLSA-201803-01
reference_type
scores
url https://security.gentoo.org/glsa/201803-01
22
reference_url https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html
reference_id msg00009.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/
url https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html
23
reference_url https://usn.ubuntu.com/3565-1/
reference_id USN-3565-1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:03:40Z/
url https://usn.ubuntu.com/3565-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.90.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.90.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.90.1-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2018-6789
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-56xq-sgry-2uhd
7
url VCID-5e2k-ure4-wfdf
vulnerability_id VCID-5e2k-ure4-wfdf
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42117.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42117.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42117
reference_id
reference_type
scores
0
value 0.0735
scoring_system epss
scoring_elements 0.91671
published_at 2026-04-02T12:55:00Z
1
value 0.0735
scoring_system epss
scoring_elements 0.91722
published_at 2026-04-21T12:55:00Z
2
value 0.0735
scoring_system epss
scoring_elements 0.91728
published_at 2026-04-16T12:55:00Z
3
value 0.0735
scoring_system epss
scoring_elements 0.91721
published_at 2026-04-18T12:55:00Z
4
value 0.0735
scoring_system epss
scoring_elements 0.91677
published_at 2026-04-04T12:55:00Z
5
value 0.0735
scoring_system epss
scoring_elements 0.91686
published_at 2026-04-07T12:55:00Z
6
value 0.0735
scoring_system epss
scoring_elements 0.91698
published_at 2026-04-08T12:55:00Z
7
value 0.0735
scoring_system epss
scoring_elements 0.91705
published_at 2026-04-09T12:55:00Z
8
value 0.0735
scoring_system epss
scoring_elements 0.91709
published_at 2026-04-11T12:55:00Z
9
value 0.0735
scoring_system epss
scoring_elements 0.91711
published_at 2026-04-12T12:55:00Z
10
value 0.0735
scoring_system epss
scoring_elements 0.91707
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42117
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42117
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42117
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241531
reference_id 2241531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241531
4
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
5
reference_url https://usn.ubuntu.com/6455-1/
reference_id USN-6455-1
reference_type
scores
url https://usn.ubuntu.com/6455-1/
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-1471/
reference_id ZDI-23-1471
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-03T16:58:53Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-1471/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.97~RC2-2?distro=trixie
purl pkg:deb/debian/exim4@4.97~RC2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.97~RC2-2%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
6
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2023-42117
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5e2k-ure4-wfdf
8
url VCID-5q8s-xzfq-mfa8
vulnerability_id VCID-5q8s-xzfq-mfa8
summary Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0400
reference_id
reference_type
scores
0
value 0.06391
scoring_system epss
scoring_elements 0.90971
published_at 2026-04-01T12:55:00Z
1
value 0.06391
scoring_system epss
scoring_elements 0.90977
published_at 2026-04-02T12:55:00Z
2
value 0.06391
scoring_system epss
scoring_elements 0.90986
published_at 2026-04-04T12:55:00Z
3
value 0.06391
scoring_system epss
scoring_elements 0.90997
published_at 2026-04-07T12:55:00Z
4
value 0.06391
scoring_system epss
scoring_elements 0.91009
published_at 2026-04-08T12:55:00Z
5
value 0.06391
scoring_system epss
scoring_elements 0.91014
published_at 2026-04-09T12:55:00Z
6
value 0.06391
scoring_system epss
scoring_elements 0.91023
published_at 2026-04-13T12:55:00Z
7
value 0.06391
scoring_system epss
scoring_elements 0.91047
published_at 2026-04-16T12:55:00Z
8
value 0.06391
scoring_system epss
scoring_elements 0.91046
published_at 2026-04-18T12:55:00Z
9
value 0.06391
scoring_system epss
scoring_elements 0.91048
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0400
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0400
fixed_packages
0
url pkg:deb/debian/exim4@4.33-1?distro=trixie
purl pkg:deb/debian/exim4@4.33-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.33-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2004-0400
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5q8s-xzfq-mfa8
9
url VCID-5vks-gjgj-euhp
vulnerability_id VCID-5vks-gjgj-euhp
summary
Multiple vulnerabilities were found in Exim, the worst of which
    leading to remote execution of arbitrary code with root privileges.
references
0
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html
1
reference_url http://bugs.exim.org/show_bug.cgi?id=988
reference_id
reference_type
scores
url http://bugs.exim.org/show_bug.cgi?id=988
2
reference_url http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html
reference_id
reference_type
scores
url http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2023.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2023.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2023
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25363
published_at 2026-04-01T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25432
published_at 2026-04-02T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25467
published_at 2026-04-04T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.2524
published_at 2026-04-07T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25308
published_at 2026-04-08T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25353
published_at 2026-04-09T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25365
published_at 2026-04-11T12:55:00Z
7
value 0.0023
scoring_system epss
scoring_elements 0.45834
published_at 2026-04-21T12:55:00Z
8
value 0.0023
scoring_system epss
scoring_elements 0.45839
published_at 2026-04-12T12:55:00Z
9
value 0.0023
scoring_system epss
scoring_elements 0.45842
published_at 2026-04-13T12:55:00Z
10
value 0.0023
scoring_system epss
scoring_elements 0.45895
published_at 2026-04-16T12:55:00Z
11
value 0.0023
scoring_system epss
scoring_elements 0.45888
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2023
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2023
9
reference_url http://secunia.com/advisories/40019
reference_id
reference_type
scores
url http://secunia.com/advisories/40019
10
reference_url http://secunia.com/advisories/40123
reference_id
reference_type
scores
url http://secunia.com/advisories/40123
11
reference_url http://secunia.com/advisories/43243
reference_id
reference_type
scores
url http://secunia.com/advisories/43243
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/59043
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/59043
13
reference_url http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2
reference_id
reference_type
scores
url http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2
14
reference_url http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24&r2=1.25
reference_id
reference_type
scores
url http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.24&r2=1.25
15
reference_url http://www.securityfocus.com/archive/1/511653/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/511653/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/40451
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40451
17
reference_url http://www.ubuntu.com/usn/USN-1060-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1060-1
18
reference_url http://www.vupen.com/english/advisories/2010/1402
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1402
19
reference_url http://www.vupen.com/english/advisories/2011/0364
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0364
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=600093
reference_id 600093
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=600093
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2023
reference_id CVE-2010-2023
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2023
55
reference_url https://security.gentoo.org/glsa/201401-32
reference_id GLSA-201401-32
reference_type
scores
url https://security.gentoo.org/glsa/201401-32
56
reference_url https://usn.ubuntu.com/1060-1/
reference_id USN-1060-1
reference_type
scores
url https://usn.ubuntu.com/1060-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.72-1?distro=trixie
purl pkg:deb/debian/exim4@4.72-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.72-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2010-2023
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vks-gjgj-euhp
10
url VCID-69es-qatu-uub2
vulnerability_id VCID-69es-qatu-uub2
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28023
reference_id
reference_type
scores
0
value 0.03499
scoring_system epss
scoring_elements 0.87558
published_at 2026-04-02T12:55:00Z
1
value 0.03499
scoring_system epss
scoring_elements 0.87572
published_at 2026-04-04T12:55:00Z
2
value 0.03499
scoring_system epss
scoring_elements 0.87549
published_at 2026-04-01T12:55:00Z
3
value 0.03787
scoring_system epss
scoring_elements 0.88068
published_at 2026-04-09T12:55:00Z
4
value 0.03787
scoring_system epss
scoring_elements 0.88079
published_at 2026-04-11T12:55:00Z
5
value 0.03787
scoring_system epss
scoring_elements 0.88071
published_at 2026-04-12T12:55:00Z
6
value 0.03787
scoring_system epss
scoring_elements 0.88072
published_at 2026-04-13T12:55:00Z
7
value 0.03787
scoring_system epss
scoring_elements 0.88086
published_at 2026-04-16T12:55:00Z
8
value 0.03787
scoring_system epss
scoring_elements 0.88083
published_at 2026-04-21T12:55:00Z
9
value 0.03787
scoring_system epss
scoring_elements 0.88043
published_at 2026-04-07T12:55:00Z
10
value 0.03787
scoring_system epss
scoring_elements 0.88063
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28023
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28023
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69es-qatu-uub2
11
url VCID-6dwr-t9kn-2yfn
vulnerability_id VCID-6dwr-t9kn-2yfn
summary A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3559
reference_id
reference_type
scores
0
value 0.00658
scoring_system epss
scoring_elements 0.71002
published_at 2026-04-02T12:55:00Z
1
value 0.00658
scoring_system epss
scoring_elements 0.7102
published_at 2026-04-04T12:55:00Z
2
value 0.00658
scoring_system epss
scoring_elements 0.70994
published_at 2026-04-07T12:55:00Z
3
value 0.00658
scoring_system epss
scoring_elements 0.71037
published_at 2026-04-08T12:55:00Z
4
value 0.00658
scoring_system epss
scoring_elements 0.71052
published_at 2026-04-09T12:55:00Z
5
value 0.00658
scoring_system epss
scoring_elements 0.71075
published_at 2026-04-11T12:55:00Z
6
value 0.00658
scoring_system epss
scoring_elements 0.7106
published_at 2026-04-12T12:55:00Z
7
value 0.00658
scoring_system epss
scoring_elements 0.71042
published_at 2026-04-13T12:55:00Z
8
value 0.00658
scoring_system epss
scoring_elements 0.71089
published_at 2026-04-16T12:55:00Z
9
value 0.00658
scoring_system epss
scoring_elements 0.71096
published_at 2026-04-18T12:55:00Z
10
value 0.00658
scoring_system epss
scoring_elements 0.71076
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3559
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3559
2
reference_url https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2
reference_id 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:41Z/
url https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/
reference_id EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/
4
reference_url https://vuldb.com/?id.211073
reference_id ?id.211073
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:41Z/
url https://vuldb.com/?id.211073
5
reference_url https://bugs.exim.org/show_bug.cgi?id=2915
reference_id show_bug.cgi?id=2915
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:41Z/
url https://bugs.exim.org/show_bug.cgi?id=2915
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/
reference_id TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMQ6OCKPNPBPSD37YR4FOWV2R54M2UEP/
7
reference_url https://usn.ubuntu.com/5741-1/
reference_id USN-5741-1
reference_type
scores
url https://usn.ubuntu.com/5741-1/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/
reference_id WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WFHLZVHNNO2GWYP5EA4TZQZ5O4GVPARR/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-4?distro=trixie
purl pkg:deb/debian/exim4@4.96-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-4%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2022-3559
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dwr-t9kn-2yfn
12
url VCID-7vuu-yzmu-duew
vulnerability_id VCID-7vuu-yzmu-duew
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28017
reference_id
reference_type
scores
0
value 0.03214
scoring_system epss
scoring_elements 0.87041
published_at 2026-04-12T12:55:00Z
1
value 0.03214
scoring_system epss
scoring_elements 0.87035
published_at 2026-04-13T12:55:00Z
2
value 0.03214
scoring_system epss
scoring_elements 0.87052
published_at 2026-04-16T12:55:00Z
3
value 0.03214
scoring_system epss
scoring_elements 0.87056
published_at 2026-04-18T12:55:00Z
4
value 0.03214
scoring_system epss
scoring_elements 0.87005
published_at 2026-04-07T12:55:00Z
5
value 0.03214
scoring_system epss
scoring_elements 0.87025
published_at 2026-04-08T12:55:00Z
6
value 0.03214
scoring_system epss
scoring_elements 0.87033
published_at 2026-04-09T12:55:00Z
7
value 0.03214
scoring_system epss
scoring_elements 0.87046
published_at 2026-04-11T12:55:00Z
8
value 0.0344
scoring_system epss
scoring_elements 0.87432
published_at 2026-04-01T12:55:00Z
9
value 0.0344
scoring_system epss
scoring_elements 0.87441
published_at 2026-04-02T12:55:00Z
10
value 0.0344
scoring_system epss
scoring_elements 0.87455
published_at 2026-04-04T12:55:00Z
11
value 0.03683
scoring_system epss
scoring_elements 0.87939
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28017
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
21
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28017
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7vuu-yzmu-duew
13
url VCID-838e-pk6w-t3by
vulnerability_id VCID-838e-pk6w-t3by
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28025
reference_id
reference_type
scores
0
value 0.01659
scoring_system epss
scoring_elements 0.82026
published_at 2026-04-04T12:55:00Z
1
value 0.01659
scoring_system epss
scoring_elements 0.81992
published_at 2026-04-01T12:55:00Z
2
value 0.01659
scoring_system epss
scoring_elements 0.82004
published_at 2026-04-02T12:55:00Z
3
value 0.01799
scoring_system epss
scoring_elements 0.82774
published_at 2026-04-09T12:55:00Z
4
value 0.01799
scoring_system epss
scoring_elements 0.82791
published_at 2026-04-11T12:55:00Z
5
value 0.01799
scoring_system epss
scoring_elements 0.82786
published_at 2026-04-12T12:55:00Z
6
value 0.01799
scoring_system epss
scoring_elements 0.82782
published_at 2026-04-13T12:55:00Z
7
value 0.01799
scoring_system epss
scoring_elements 0.82821
published_at 2026-04-16T12:55:00Z
8
value 0.01799
scoring_system epss
scoring_elements 0.8282
published_at 2026-04-18T12:55:00Z
9
value 0.01799
scoring_system epss
scoring_elements 0.82823
published_at 2026-04-21T12:55:00Z
10
value 0.01799
scoring_system epss
scoring_elements 0.82742
published_at 2026-04-07T12:55:00Z
11
value 0.01799
scoring_system epss
scoring_elements 0.82768
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28025
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
21
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28025
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-838e-pk6w-t3by
14
url VCID-85d7-xwsd-u7hf
vulnerability_id VCID-85d7-xwsd-u7hf
summary Exim: Exim before 4.96 has an invalid free in pam_converse
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37451.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37451.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-37451
reference_id
reference_type
scores
0
value 0.06068
scoring_system epss
scoring_elements 0.90711
published_at 2026-04-02T12:55:00Z
1
value 0.06068
scoring_system epss
scoring_elements 0.90721
published_at 2026-04-04T12:55:00Z
2
value 0.06068
scoring_system epss
scoring_elements 0.90731
published_at 2026-04-07T12:55:00Z
3
value 0.06068
scoring_system epss
scoring_elements 0.90742
published_at 2026-04-08T12:55:00Z
4
value 0.06068
scoring_system epss
scoring_elements 0.90748
published_at 2026-04-09T12:55:00Z
5
value 0.06068
scoring_system epss
scoring_elements 0.90757
published_at 2026-04-11T12:55:00Z
6
value 0.06068
scoring_system epss
scoring_elements 0.90756
published_at 2026-04-12T12:55:00Z
7
value 0.06068
scoring_system epss
scoring_elements 0.90753
published_at 2026-04-13T12:55:00Z
8
value 0.06068
scoring_system epss
scoring_elements 0.90772
published_at 2026-04-16T12:55:00Z
9
value 0.06068
scoring_system epss
scoring_elements 0.90769
published_at 2026-04-18T12:55:00Z
10
value 0.06068
scoring_system epss
scoring_elements 0.90768
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-37451
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119782
reference_id 2119782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119782
fixed_packages
0
url pkg:deb/debian/exim4@0?distro=trixie
purl pkg:deb/debian/exim4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@0%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.95-4?distro=trixie
purl pkg:deb/debian/exim4@4.95-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.95-4%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2022-37451
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-85d7-xwsd-u7hf
15
url VCID-85sn-frqr-wqc1
vulnerability_id VCID-85sn-frqr-wqc1
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9963.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9963.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9963
reference_id
reference_type
scores
0
value 0.01678
scoring_system epss
scoring_elements 0.82098
published_at 2026-04-01T12:55:00Z
1
value 0.01678
scoring_system epss
scoring_elements 0.8211
published_at 2026-04-02T12:55:00Z
2
value 0.01678
scoring_system epss
scoring_elements 0.82131
published_at 2026-04-04T12:55:00Z
3
value 0.01678
scoring_system epss
scoring_elements 0.82126
published_at 2026-04-07T12:55:00Z
4
value 0.01678
scoring_system epss
scoring_elements 0.82153
published_at 2026-04-08T12:55:00Z
5
value 0.01678
scoring_system epss
scoring_elements 0.8216
published_at 2026-04-09T12:55:00Z
6
value 0.01678
scoring_system epss
scoring_elements 0.82179
published_at 2026-04-11T12:55:00Z
7
value 0.01678
scoring_system epss
scoring_elements 0.8217
published_at 2026-04-12T12:55:00Z
8
value 0.01678
scoring_system epss
scoring_elements 0.82165
published_at 2026-04-13T12:55:00Z
9
value 0.01678
scoring_system epss
scoring_elements 0.82203
published_at 2026-04-18T12:55:00Z
10
value 0.01678
scoring_system epss
scoring_elements 0.82204
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9963
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9963
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1405322
reference_id 1405322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1405322
4
reference_url https://security.archlinux.org/AVG-153
reference_id AVG-153
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-153
5
reference_url https://usn.ubuntu.com/3164-1/
reference_id USN-3164-1
reference_type
scores
url https://usn.ubuntu.com/3164-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.88~RC6-2?distro=trixie
purl pkg:deb/debian/exim4@4.88~RC6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.88~RC6-2%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2016-9963
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-85sn-frqr-wqc1
16
url VCID-879s-a42x-bqhu
vulnerability_id VCID-879s-a42x-bqhu
summary
Multiple vulnerabilities were found in Exim, the worst of which
    leading to remote execution of arbitrary code with root privileges.
references
0
reference_url http://bugs.exim.org/show_bug.cgi?id=1044
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://bugs.exim.org/show_bug.cgi?id=1044
1
reference_url http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://lists.exim.org/lurker/message/20101209.172233.abcba158.en.html
2
reference_url http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html
4
reference_url http://openwall.com/lists/oss-security/2010/12/10/1
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://openwall.com/lists/oss-security/2010/12/10/1
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4345.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4345.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4345
reference_id
reference_type
scores
0
value 0.04024
scoring_system epss
scoring_elements 0.88425
published_at 2026-04-01T12:55:00Z
1
value 0.04024
scoring_system epss
scoring_elements 0.8844
published_at 2026-04-04T12:55:00Z
2
value 0.04024
scoring_system epss
scoring_elements 0.88433
published_at 2026-04-02T12:55:00Z
3
value 0.05133
scoring_system epss
scoring_elements 0.89864
published_at 2026-04-08T12:55:00Z
4
value 0.05133
scoring_system epss
scoring_elements 0.89847
published_at 2026-04-07T12:55:00Z
5
value 0.05133
scoring_system epss
scoring_elements 0.89882
published_at 2026-04-18T12:55:00Z
6
value 0.05133
scoring_system epss
scoring_elements 0.89874
published_at 2026-04-12T12:55:00Z
7
value 0.05133
scoring_system epss
scoring_elements 0.89881
published_at 2026-04-16T12:55:00Z
8
value 0.05133
scoring_system epss
scoring_elements 0.89868
published_at 2026-04-13T12:55:00Z
9
value 0.05133
scoring_system epss
scoring_elements 0.89876
published_at 2026-04-11T12:55:00Z
10
value 0.05133
scoring_system epss
scoring_elements 0.8987
published_at 2026-04-09T12:55:00Z
11
value 0.06001
scoring_system epss
scoring_elements 0.90705
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4345
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4345
8
reference_url http://secunia.com/advisories/42576
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://secunia.com/advisories/42576
9
reference_url http://secunia.com/advisories/42930
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://secunia.com/advisories/42930
10
reference_url http://secunia.com/advisories/43128
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://secunia.com/advisories/43128
11
reference_url http://secunia.com/advisories/43243
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://secunia.com/advisories/43243
12
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-4345
reference_id
reference_type
scores
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-4345
13
reference_url http://www.cpanel.net/2010/12/critical-exim-security-update.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.cpanel.net/2010/12/critical-exim-security-update.html
14
reference_url http://www.debian.org/security/2010/dsa-2131
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.debian.org/security/2010/dsa-2131
15
reference_url http://www.debian.org/security/2011/dsa-2154
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.debian.org/security/2011/dsa-2154
16
reference_url http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html
17
reference_url http://www.kb.cert.org/vuls/id/758489
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.kb.cert.org/vuls/id/758489
18
reference_url http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format
19
reference_url http://www.openwall.com/lists/oss-security/2021/05/04/7
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.openwall.com/lists/oss-security/2021/05/04/7
20
reference_url http://www.redhat.com/support/errata/RHSA-2011-0153.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.redhat.com/support/errata/RHSA-2011-0153.html
21
reference_url http://www.securityfocus.com/archive/1/515172/100/0/threaded
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.securityfocus.com/archive/1/515172/100/0/threaded
22
reference_url http://www.securityfocus.com/bid/45341
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.securityfocus.com/bid/45341
23
reference_url http://www.securitytracker.com/id?1024859
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.securitytracker.com/id?1024859
24
reference_url http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/
25
reference_url http://www.ubuntu.com/usn/USN-1060-1
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.ubuntu.com/usn/USN-1060-1
26
reference_url http://www.vupen.com/english/advisories/2010/3171
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.vupen.com/english/advisories/2010/3171
27
reference_url http://www.vupen.com/english/advisories/2010/3204
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.vupen.com/english/advisories/2010/3204
28
reference_url http://www.vupen.com/english/advisories/2011/0135
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.vupen.com/english/advisories/2011/0135
29
reference_url http://www.vupen.com/english/advisories/2011/0245
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.vupen.com/english/advisories/2011/0245
30
reference_url http://www.vupen.com/english/advisories/2011/0364
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url http://www.vupen.com/english/advisories/2011/0364
31
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606527
reference_id 606527
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606527
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=662012
reference_id 662012
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:24:14Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=662012
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4345
reference_id CVE-2010-4345
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2010-4345
44
reference_url https://security.gentoo.org/glsa/201401-32
reference_id GLSA-201401-32
reference_type
scores
url https://security.gentoo.org/glsa/201401-32
45
reference_url https://access.redhat.com/errata/RHSA-2011:0153
reference_id RHSA-2011:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0153
46
reference_url https://usn.ubuntu.com/1060-1/
reference_id USN-1060-1
reference_type
scores
url https://usn.ubuntu.com/1060-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.72-3?distro=trixie
purl pkg:deb/debian/exim4@4.72-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.72-3%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2010-4345
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-879s-a42x-bqhu
17
url VCID-87un-11ea-myhg
vulnerability_id VCID-87un-11ea-myhg
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28014
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37737
published_at 2026-04-21T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37794
published_at 2026-04-12T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37769
published_at 2026-04-13T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37817
published_at 2026-04-16T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37798
published_at 2026-04-18T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37752
published_at 2026-04-07T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37803
published_at 2026-04-08T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37815
published_at 2026-04-09T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.3783
published_at 2026-04-11T12:55:00Z
9
value 0.002
scoring_system epss
scoring_elements 0.42091
published_at 2026-04-02T12:55:00Z
10
value 0.002
scoring_system epss
scoring_elements 0.42119
published_at 2026-04-04T12:55:00Z
11
value 0.002
scoring_system epss
scoring_elements 0.4203
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28014
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
21
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28014
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-87un-11ea-myhg
18
url VCID-92ug-3eae-tydc
vulnerability_id VCID-92ug-3eae-tydc
summary Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-37452
reference_id
reference_type
scores
0
value 0.04696
scoring_system epss
scoring_elements 0.89315
published_at 2026-04-02T12:55:00Z
1
value 0.04696
scoring_system epss
scoring_elements 0.89328
published_at 2026-04-04T12:55:00Z
2
value 0.04696
scoring_system epss
scoring_elements 0.8933
published_at 2026-04-07T12:55:00Z
3
value 0.04696
scoring_system epss
scoring_elements 0.89347
published_at 2026-04-08T12:55:00Z
4
value 0.04696
scoring_system epss
scoring_elements 0.89351
published_at 2026-04-09T12:55:00Z
5
value 0.04696
scoring_system epss
scoring_elements 0.8936
published_at 2026-04-11T12:55:00Z
6
value 0.04696
scoring_system epss
scoring_elements 0.89357
published_at 2026-04-12T12:55:00Z
7
value 0.04696
scoring_system epss
scoring_elements 0.89353
published_at 2026-04-13T12:55:00Z
8
value 0.04696
scoring_system epss
scoring_elements 0.89367
published_at 2026-04-18T12:55:00Z
9
value 0.04696
scoring_system epss
scoring_elements 0.89364
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-37452
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37452
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37452
2
reference_url https://usn.ubuntu.com/5574-1/
reference_id USN-5574-1
reference_type
scores
url https://usn.ubuntu.com/5574-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-5?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-5%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2022-37452
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-92ug-3eae-tydc
19
url VCID-avxe-yhcq-wudx
vulnerability_id VCID-avxe-yhcq-wudx
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28007
reference_id
reference_type
scores
0
value 0.00175
scoring_system epss
scoring_elements 0.38988
published_at 2026-04-21T12:55:00Z
1
value 0.00175
scoring_system epss
scoring_elements 0.39066
published_at 2026-04-12T12:55:00Z
2
value 0.00175
scoring_system epss
scoring_elements 0.39046
published_at 2026-04-13T12:55:00Z
3
value 0.00175
scoring_system epss
scoring_elements 0.39101
published_at 2026-04-16T12:55:00Z
4
value 0.00175
scoring_system epss
scoring_elements 0.39072
published_at 2026-04-18T12:55:00Z
5
value 0.00175
scoring_system epss
scoring_elements 0.39023
published_at 2026-04-07T12:55:00Z
6
value 0.00175
scoring_system epss
scoring_elements 0.39075
published_at 2026-04-08T12:55:00Z
7
value 0.00175
scoring_system epss
scoring_elements 0.39091
published_at 2026-04-09T12:55:00Z
8
value 0.00175
scoring_system epss
scoring_elements 0.39103
published_at 2026-04-11T12:55:00Z
9
value 0.00211
scoring_system epss
scoring_elements 0.43572
published_at 2026-04-02T12:55:00Z
10
value 0.00211
scoring_system epss
scoring_elements 0.43599
published_at 2026-04-04T12:55:00Z
11
value 0.00211
scoring_system epss
scoring_elements 0.4351
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28007
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
21
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28007
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-avxe-yhcq-wudx
20
url VCID-awpv-dmgg-abef
vulnerability_id VCID-awpv-dmgg-abef
summary security flaw
references
0
reference_url http://ftp6.us.freebsd.org/pub/mail/exim/ChangeLogs/ChangeLog-4.44
reference_id
reference_type
scores
url http://ftp6.us.freebsd.org/pub/mail/exim/ChangeLogs/ChangeLog-4.44
1
reference_url http://marc.info/?l=bugtraq&m=110824870908614&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110824870908614&w=2
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0022.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0022.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0022
reference_id
reference_type
scores
0
value 0.01451
scoring_system epss
scoring_elements 0.8082
published_at 2026-04-21T12:55:00Z
1
value 0.01451
scoring_system epss
scoring_elements 0.80723
published_at 2026-04-01T12:55:00Z
2
value 0.01451
scoring_system epss
scoring_elements 0.80732
published_at 2026-04-02T12:55:00Z
3
value 0.01451
scoring_system epss
scoring_elements 0.80753
published_at 2026-04-04T12:55:00Z
4
value 0.01451
scoring_system epss
scoring_elements 0.8075
published_at 2026-04-07T12:55:00Z
5
value 0.01451
scoring_system epss
scoring_elements 0.80778
published_at 2026-04-08T12:55:00Z
6
value 0.01451
scoring_system epss
scoring_elements 0.80787
published_at 2026-04-09T12:55:00Z
7
value 0.01451
scoring_system epss
scoring_elements 0.80803
published_at 2026-04-11T12:55:00Z
8
value 0.01451
scoring_system epss
scoring_elements 0.80788
published_at 2026-04-12T12:55:00Z
9
value 0.01451
scoring_system epss
scoring_elements 0.80779
published_at 2026-04-13T12:55:00Z
10
value 0.01451
scoring_system epss
scoring_elements 0.80816
published_at 2026-04-16T12:55:00Z
11
value 0.01451
scoring_system epss
scoring_elements 0.80819
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0022
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0022
5
reference_url http://security.gentoo.org/glsa/glsa-200501-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200501-23.xml
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11293
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11293
7
reference_url http://www.exim.org/mail-archives/exim-users/Week-of-Mon-20050103/msg00028.html
reference_id
reference_type
scores
url http://www.exim.org/mail-archives/exim-users/Week-of-Mon-20050103/msg00028.html
8
reference_url http://www.idefense.com/application/poi/display?id=178&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=178&type=vulnerabilities
9
reference_url http://www.redhat.com/support/errata/RHSA-2005-025.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-025.html
10
reference_url http://www.securityfocus.com/bid/12188
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12188
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617440
reference_id 1617440
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617440
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_cambridge:exim:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_cambridge:exim:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_cambridge:exim:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_cambridge:exim:4.41:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_cambridge:exim:4.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_cambridge:exim:4.41:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_cambridge:exim:4.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_cambridge:exim:4.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_cambridge:exim:4.42:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0022
reference_id CVE-2005-0022
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0022
16
reference_url https://access.redhat.com/errata/RHSA-2005:025
reference_id RHSA-2005:025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:025
17
reference_url https://usn.ubuntu.com/56-1/
reference_id USN-56-1
reference_type
scores
url https://usn.ubuntu.com/56-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.34-10?distro=trixie
purl pkg:deb/debian/exim4@4.34-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.34-10%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2005-0022
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-awpv-dmgg-abef
21
url VCID-bdkr-87xb-4yf8
vulnerability_id VCID-bdkr-87xb-4yf8
summary
Multiple vulnerabilities were found in Exim, the worst of which
    leading to remote execution of arbitrary code with root privileges.
references
0
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0079.html
1
reference_url http://bugs.exim.org/show_bug.cgi?id=989
reference_id
reference_type
scores
url http://bugs.exim.org/show_bug.cgi?id=989
2
reference_url http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html
reference_id
reference_type
scores
url http://lists.exim.org/lurker/message/20100524.175925.9a69f755.en.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042587.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042613.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2024.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2024.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2024
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20753
published_at 2026-04-01T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20901
published_at 2026-04-02T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20961
published_at 2026-04-04T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20675
published_at 2026-04-07T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20752
published_at 2026-04-08T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20813
published_at 2026-04-09T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20831
published_at 2026-04-11T12:55:00Z
7
value 0.00174
scoring_system epss
scoring_elements 0.38735
published_at 2026-04-21T12:55:00Z
8
value 0.00174
scoring_system epss
scoring_elements 0.38819
published_at 2026-04-12T12:55:00Z
9
value 0.00174
scoring_system epss
scoring_elements 0.38791
published_at 2026-04-13T12:55:00Z
10
value 0.00174
scoring_system epss
scoring_elements 0.38837
published_at 2026-04-16T12:55:00Z
11
value 0.00174
scoring_system epss
scoring_elements 0.38815
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2024
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2024
9
reference_url http://secunia.com/advisories/40019
reference_id
reference_type
scores
url http://secunia.com/advisories/40019
10
reference_url http://secunia.com/advisories/40123
reference_id
reference_type
scores
url http://secunia.com/advisories/40123
11
reference_url http://secunia.com/advisories/43243
reference_id
reference_type
scores
url http://secunia.com/advisories/43243
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/59042
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/59042
13
reference_url http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2
reference_id
reference_type
scores
url http://vcs.exim.org/viewvc/exim/exim-doc/doc-txt/ChangeLog?view=markup&pathrev=exim-4_72_RC2
14
reference_url http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.25&r2=1.26
reference_id
reference_type
scores
url http://vcs.exim.org/viewvc/exim/exim-src/src/transports/appendfile.c?r1=1.25&r2=1.26
15
reference_url http://www.securityfocus.com/archive/1/511653/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/511653/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/40454
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40454
17
reference_url http://www.ubuntu.com/usn/USN-1060-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1060-1
18
reference_url http://www.vupen.com/english/advisories/2010/1402
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1402
19
reference_url http://www.vupen.com/english/advisories/2011/0364
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0364
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=600097
reference_id 600097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=600097
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2024
reference_id CVE-2010-2024
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2024
55
reference_url https://security.gentoo.org/glsa/201401-32
reference_id GLSA-201401-32
reference_type
scores
url https://security.gentoo.org/glsa/201401-32
56
reference_url https://usn.ubuntu.com/1060-1/
reference_id USN-1060-1
reference_type
scores
url https://usn.ubuntu.com/1060-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.72-1?distro=trixie
purl pkg:deb/debian/exim4@4.72-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.72-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2010-2024
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdkr-87xb-4yf8
22
url VCID-bgxc-8scn-z7e8
vulnerability_id VCID-bgxc-8scn-z7e8
summary
A vulnerability in Exim could allow a remote attacker to execute
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16928.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16928.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16928
reference_id
reference_type
scores
0
value 0.89816
scoring_system epss
scoring_elements 0.99569
published_at 2026-04-13T12:55:00Z
1
value 0.89905
scoring_system epss
scoring_elements 0.99571
published_at 2026-04-01T12:55:00Z
2
value 0.89905
scoring_system epss
scoring_elements 0.99572
published_at 2026-04-04T12:55:00Z
3
value 0.89905
scoring_system epss
scoring_elements 0.99574
published_at 2026-04-09T12:55:00Z
4
value 0.89905
scoring_system epss
scoring_elements 0.9957
published_at 2026-04-02T12:55:00Z
5
value 0.89905
scoring_system epss
scoring_elements 0.99573
published_at 2026-04-07T12:55:00Z
6
value 0.90019
scoring_system epss
scoring_elements 0.99584
published_at 2026-04-21T12:55:00Z
7
value 0.90019
scoring_system epss
scoring_elements 0.99582
published_at 2026-04-16T12:55:00Z
8
value 0.90019
scoring_system epss
scoring_elements 0.99583
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16928
2
reference_url https://bugs.exim.org/show_bug.cgi?id=2449
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url https://bugs.exim.org/show_bug.cgi?id=2449
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16928
4
reference_url https://git.exim.org/exim.git/commit/478effbfd9c3cc5a627fc671d4bf94d13670d65f
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url https://git.exim.org/exim.git/commit/478effbfd9c3cc5a627fc671d4bf94d13670d65f
5
reference_url https://lists.exim.org/lurker/message/20190927.032457.c1044d4c.en.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url https://lists.exim.org/lurker/message/20190927.032457.c1044d4c.en.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EED7HM3MFIBAP5OIMJAFJ35JAJABTVSC/
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EED7HM3MFIBAP5OIMJAFJ35JAJABTVSC/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3TJW4HPYH3O5HZCWGD6NSHTEBTTAPDC/
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3TJW4HPYH3O5HZCWGD6NSHTEBTTAPDC/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UY6HPRW7MR3KBQ5JFHH6OXM7YCZBJCOB/
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UY6HPRW7MR3KBQ5JFHH6OXM7YCZBJCOB/
9
reference_url https://seclists.org/bugtraq/2019/Sep/60
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url https://seclists.org/bugtraq/2019/Sep/60
10
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-16928
reference_id
reference_type
scores
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-16928
11
reference_url https://www.debian.org/security/2019/dsa-4536
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url https://www.debian.org/security/2019/dsa-4536
12
reference_url http://www.openwall.com/lists/oss-security/2019/09/28/1
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url http://www.openwall.com/lists/oss-security/2019/09/28/1
13
reference_url http://www.openwall.com/lists/oss-security/2019/09/28/2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url http://www.openwall.com/lists/oss-security/2019/09/28/2
14
reference_url http://www.openwall.com/lists/oss-security/2019/09/28/3
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url http://www.openwall.com/lists/oss-security/2019/09/28/3
15
reference_url http://www.openwall.com/lists/oss-security/2019/09/28/4
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url http://www.openwall.com/lists/oss-security/2019/09/28/4
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1756930
reference_id 1756930
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1756930
17
reference_url https://security.archlinux.org/ASA-201910-1
reference_id ASA-201910-1
reference_type
scores
url https://security.archlinux.org/ASA-201910-1
18
reference_url https://security.archlinux.org/AVG-1038
reference_id AVG-1038
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1038
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16928
reference_id CVE-2019-16928
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-16928
26
reference_url https://security.gentoo.org/glsa/202003-47
reference_id GLSA-202003-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url https://security.gentoo.org/glsa/202003-47
27
reference_url https://usn.ubuntu.com/4141-1/
reference_id USN-4141-1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-04T20:03:35Z/
url https://usn.ubuntu.com/4141-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.92.2-3?distro=trixie
purl pkg:deb/debian/exim4@4.92.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.92.2-3%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2019-16928
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bgxc-8scn-z7e8
23
url VCID-bz4v-p82a-skgk
vulnerability_id VCID-bz4v-p82a-skgk
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28012
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35068
published_at 2026-04-21T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35152
published_at 2026-04-11T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35117
published_at 2026-04-18T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35093
published_at 2026-04-13T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35131
published_at 2026-04-16T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35077
published_at 2026-04-07T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35122
published_at 2026-04-08T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35147
published_at 2026-04-09T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39189
published_at 2026-04-02T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39211
published_at 2026-04-04T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39003
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28012
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
21
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28012
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bz4v-p82a-skgk
24
url VCID-c9g9-ufem-9bgr
vulnerability_id VCID-c9g9-ufem-9bgr
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url http://openwall.com/lists/oss-security/2017/11/25/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/11/25/1
1
reference_url http://openwall.com/lists/oss-security/2017/11/25/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/11/25/2
2
reference_url http://openwall.com/lists/oss-security/2017/11/25/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/11/25/3
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16943.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16943.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16943
reference_id
reference_type
scores
0
value 0.745
scoring_system epss
scoring_elements 0.98838
published_at 2026-04-01T12:55:00Z
1
value 0.745
scoring_system epss
scoring_elements 0.98843
published_at 2026-04-07T12:55:00Z
2
value 0.745
scoring_system epss
scoring_elements 0.98839
published_at 2026-04-02T12:55:00Z
3
value 0.745
scoring_system epss
scoring_elements 0.98841
published_at 2026-04-04T12:55:00Z
4
value 0.745
scoring_system epss
scoring_elements 0.98844
published_at 2026-04-08T12:55:00Z
5
value 0.76925
scoring_system epss
scoring_elements 0.9896
published_at 2026-04-16T12:55:00Z
6
value 0.76925
scoring_system epss
scoring_elements 0.98957
published_at 2026-04-11T12:55:00Z
7
value 0.76925
scoring_system epss
scoring_elements 0.98958
published_at 2026-04-13T12:55:00Z
8
value 0.76925
scoring_system epss
scoring_elements 0.98961
published_at 2026-04-18T12:55:00Z
9
value 0.76925
scoring_system epss
scoring_elements 0.98963
published_at 2026-04-21T12:55:00Z
10
value 0.76925
scoring_system epss
scoring_elements 0.98956
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16943
5
reference_url https://bugs.exim.org/show_bug.cgi?id=2199
reference_id
reference_type
scores
url https://bugs.exim.org/show_bug.cgi?id=2199
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16943
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16944
8
reference_url https://git.exim.org/exim.git/commit/4090d62a4b25782129cc1643596dc2f6e8f63bde
reference_id
reference_type
scores
url https://git.exim.org/exim.git/commit/4090d62a4b25782129cc1643596dc2f6e8f63bde
9
reference_url https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4
reference_id
reference_type
scores
url https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4
10
reference_url https://github.com/LetUsFsck/PoC-Exploit-Mirror/tree/master/CVE-2017-16944
reference_id
reference_type
scores
url https://github.com/LetUsFsck/PoC-Exploit-Mirror/tree/master/CVE-2017-16944
11
reference_url https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html
reference_id
reference_type
scores
url https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html
12
reference_url https://www.debian.org/security/2017/dsa-4053
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4053
13
reference_url http://www.openwall.com/lists/oss-security/2021/05/04/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2021/05/04/7
14
reference_url http://www.securitytracker.com/id/1039872
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039872
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1517680
reference_id 1517680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1517680
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882648
reference_id 882648
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882648
17
reference_url https://security.archlinux.org/ASA-201711-32
reference_id ASA-201711-32
reference_type
scores
url https://security.archlinux.org/ASA-201711-32
18
reference_url https://security.archlinux.org/AVG-518
reference_id AVG-518
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-518
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.88:-:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.88:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.88:-:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.89:-:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.89:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.89:-:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16943
reference_id CVE-2017-16943
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16943
23
reference_url https://security.gentoo.org/glsa/201803-01
reference_id GLSA-201803-01
reference_type
scores
url https://security.gentoo.org/glsa/201803-01
24
reference_url https://usn.ubuntu.com/3493-1/
reference_id USN-3493-1
reference_type
scores
url https://usn.ubuntu.com/3493-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.89-12?distro=trixie
purl pkg:deb/debian/exim4@4.89-12?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.89-12%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2017-16943
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9g9-ufem-9bgr
25
url VCID-caau-2ury-hbbs
vulnerability_id VCID-caau-2ury-hbbs
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28011
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35838
published_at 2026-04-21T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35884
published_at 2026-04-12T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.3586
published_at 2026-04-13T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.359
published_at 2026-04-16T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35887
published_at 2026-04-18T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35846
published_at 2026-04-07T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35897
published_at 2026-04-08T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35919
published_at 2026-04-09T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35925
published_at 2026-04-11T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.4003
published_at 2026-04-02T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.40056
published_at 2026-04-04T12:55:00Z
11
value 0.00183
scoring_system epss
scoring_elements 0.39882
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28011
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
21
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28011
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-caau-2ury-hbbs
26
url VCID-d8va-5pph-7yb5
vulnerability_id VCID-d8va-5pph-7yb5
summary Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0399
reference_id
reference_type
scores
0
value 0.42079
scoring_system epss
scoring_elements 0.97414
published_at 2026-04-01T12:55:00Z
1
value 0.42079
scoring_system epss
scoring_elements 0.9742
published_at 2026-04-02T12:55:00Z
2
value 0.42079
scoring_system epss
scoring_elements 0.97424
published_at 2026-04-04T12:55:00Z
3
value 0.42079
scoring_system epss
scoring_elements 0.97426
published_at 2026-04-07T12:55:00Z
4
value 0.42079
scoring_system epss
scoring_elements 0.97433
published_at 2026-04-08T12:55:00Z
5
value 0.42079
scoring_system epss
scoring_elements 0.97434
published_at 2026-04-09T12:55:00Z
6
value 0.42079
scoring_system epss
scoring_elements 0.97436
published_at 2026-04-11T12:55:00Z
7
value 0.42079
scoring_system epss
scoring_elements 0.97438
published_at 2026-04-12T12:55:00Z
8
value 0.42079
scoring_system epss
scoring_elements 0.97439
published_at 2026-04-13T12:55:00Z
9
value 0.42079
scoring_system epss
scoring_elements 0.97447
published_at 2026-04-16T12:55:00Z
10
value 0.42079
scoring_system epss
scoring_elements 0.97451
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0399
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0399
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24093.c
reference_id CVE-2004-0399;OSVDB-5896
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24093.c
3
reference_url https://www.securityfocus.com/bid/10290/info
reference_id CVE-2004-0399;OSVDB-5896
reference_type exploit
scores
url https://www.securityfocus.com/bid/10290/info
fixed_packages
0
url pkg:deb/debian/exim4@4.33-1?distro=trixie
purl pkg:deb/debian/exim4@4.33-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.33-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2004-0399
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d8va-5pph-7yb5
27
url VCID-e844-g11f-f7fd
vulnerability_id VCID-e844-g11f-f7fd
summary
Multiple vulnerabilities were found in Exim, the worst of which
    leading to remote execution of arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1407.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1407.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1407
reference_id
reference_type
scores
0
value 0.00715
scoring_system epss
scoring_elements 0.72396
published_at 2026-04-21T12:55:00Z
1
value 0.00715
scoring_system epss
scoring_elements 0.72312
published_at 2026-04-01T12:55:00Z
2
value 0.00715
scoring_system epss
scoring_elements 0.72318
published_at 2026-04-02T12:55:00Z
3
value 0.00715
scoring_system epss
scoring_elements 0.72336
published_at 2026-04-04T12:55:00Z
4
value 0.00715
scoring_system epss
scoring_elements 0.72313
published_at 2026-04-07T12:55:00Z
5
value 0.00715
scoring_system epss
scoring_elements 0.72352
published_at 2026-04-08T12:55:00Z
6
value 0.00715
scoring_system epss
scoring_elements 0.72364
published_at 2026-04-09T12:55:00Z
7
value 0.00715
scoring_system epss
scoring_elements 0.72387
published_at 2026-04-11T12:55:00Z
8
value 0.00715
scoring_system epss
scoring_elements 0.7237
published_at 2026-04-12T12:55:00Z
9
value 0.00715
scoring_system epss
scoring_elements 0.72358
published_at 2026-04-13T12:55:00Z
10
value 0.00715
scoring_system epss
scoring_elements 0.72399
published_at 2026-04-16T12:55:00Z
11
value 0.00715
scoring_system epss
scoring_elements 0.72408
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1407
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1407
3
reference_url https://lists.exim.org/lurker/message/20110509.091632.daed0206.en.html
reference_id
reference_type
scores
url https://lists.exim.org/lurker/message/20110509.091632.daed0206.en.html
4
reference_url https://lists.exim.org/lurker/message/20110512.102909.8136175a.en.html
reference_id
reference_type
scores
url https://lists.exim.org/lurker/message/20110512.102909.8136175a.en.html
5
reference_url http://www.debian.org/security/2011/dsa-2236
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2236
6
reference_url http://www.securityfocus.com/bid/47836
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47836
7
reference_url http://www.ubuntu.com/usn/USN-1135-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1135-1
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=705446
reference_id 705446
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=705446
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1407
reference_id CVE-2011-1407
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-1407
16
reference_url https://security.gentoo.org/glsa/201401-32
reference_id GLSA-201401-32
reference_type
scores
url https://security.gentoo.org/glsa/201401-32
17
reference_url https://usn.ubuntu.com/1135-1/
reference_id USN-1135-1
reference_type
scores
url https://usn.ubuntu.com/1135-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.76-1?distro=trixie
purl pkg:deb/debian/exim4@4.76-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.76-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2011-1407
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e844-g11f-f7fd
28
url VCID-f998-369d-r3ds
vulnerability_id VCID-f998-369d-r3ds
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42116.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42116.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42116
reference_id
reference_type
scores
0
value 0.06734
scoring_system epss
scoring_elements 0.91234
published_at 2026-04-02T12:55:00Z
1
value 0.06734
scoring_system epss
scoring_elements 0.91306
published_at 2026-04-21T12:55:00Z
2
value 0.06734
scoring_system epss
scoring_elements 0.91279
published_at 2026-04-13T12:55:00Z
3
value 0.06734
scoring_system epss
scoring_elements 0.91304
published_at 2026-04-18T12:55:00Z
4
value 0.06734
scoring_system epss
scoring_elements 0.91243
published_at 2026-04-04T12:55:00Z
5
value 0.06734
scoring_system epss
scoring_elements 0.9125
published_at 2026-04-07T12:55:00Z
6
value 0.06734
scoring_system epss
scoring_elements 0.91263
published_at 2026-04-08T12:55:00Z
7
value 0.06734
scoring_system epss
scoring_elements 0.9127
published_at 2026-04-09T12:55:00Z
8
value 0.06734
scoring_system epss
scoring_elements 0.91277
published_at 2026-04-11T12:55:00Z
9
value 0.06734
scoring_system epss
scoring_elements 0.9128
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42116
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42116
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241528
reference_id 2241528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241528
6
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
7
reference_url https://usn.ubuntu.com/6411-1/
reference_id USN-6411-1
reference_type
scores
url https://usn.ubuntu.com/6411-1/
8
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-1470/
reference_id ZDI-23-1470
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-05T15:02:42Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-1470/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.97~RC1-2?distro=trixie
purl pkg:deb/debian/exim4@4.97~RC1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.97~RC1-2%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
6
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2023-42116
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f998-369d-r3ds
29
url VCID-fndg-t3tw-mqef
vulnerability_id VCID-fndg-t3tw-mqef
summary Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1381
reference_id
reference_type
scores
0
value 0.03052
scoring_system epss
scoring_elements 0.86634
published_at 2026-04-01T12:55:00Z
1
value 0.03052
scoring_system epss
scoring_elements 0.86645
published_at 2026-04-02T12:55:00Z
2
value 0.03052
scoring_system epss
scoring_elements 0.86665
published_at 2026-04-04T12:55:00Z
3
value 0.03052
scoring_system epss
scoring_elements 0.86664
published_at 2026-04-07T12:55:00Z
4
value 0.03052
scoring_system epss
scoring_elements 0.86683
published_at 2026-04-08T12:55:00Z
5
value 0.03052
scoring_system epss
scoring_elements 0.86692
published_at 2026-04-09T12:55:00Z
6
value 0.03052
scoring_system epss
scoring_elements 0.86706
published_at 2026-04-11T12:55:00Z
7
value 0.03052
scoring_system epss
scoring_elements 0.86703
published_at 2026-04-12T12:55:00Z
8
value 0.03052
scoring_system epss
scoring_elements 0.86696
published_at 2026-04-13T12:55:00Z
9
value 0.03052
scoring_system epss
scoring_elements 0.86709
published_at 2026-04-21T12:55:00Z
10
value 0.03052
scoring_system epss
scoring_elements 0.86715
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1381
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1381
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/22066.c
reference_id CVE-2002-1381;OSVDB-10360
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/22066.c
3
reference_url https://www.securityfocus.com/bid/6314/info
reference_id CVE-2002-1381;OSVDB-10360
reference_type exploit
scores
url https://www.securityfocus.com/bid/6314/info
fixed_packages
0
url pkg:deb/debian/exim4@4.11-0.0.1?distro=trixie
purl pkg:deb/debian/exim4@4.11-0.0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.11-0.0.1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2002-1381
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fndg-t3tw-mqef
30
url VCID-h3v8-dkfk-2bfr
vulnerability_id VCID-h3v8-dkfk-2bfr
summary A UNIX Symbolic Link (Symlink) Following vulnerability in logrotate config in the exim package allowed privilege escalation from mail user/group to root.This issue affects Tumbleweed: from ? before 4.98.2-lp156.248.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53881
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07477
published_at 2026-04-21T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07349
published_at 2026-04-18T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07362
published_at 2026-04-02T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07406
published_at 2026-04-04T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-07T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07445
published_at 2026-04-08T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07468
published_at 2026-04-09T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07461
published_at 2026-04-11T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07447
published_at 2026-04-12T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07437
published_at 2026-04-13T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07363
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53881
1
reference_url https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-53881
reference_id show_bug.cgi?id=CVE-2025-53881
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-02T17:15:08Z/
url https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-53881
fixed_packages
0
url pkg:deb/debian/exim4@0?distro=trixie
purl pkg:deb/debian/exim4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@0%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2025-53881
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h3v8-dkfk-2bfr
31
url VCID-j9ru-hveg-jke3
vulnerability_id VCID-j9ru-hveg-jke3
summary A use-after-free in Exim 4.96 through 4.98.1 could allow users (with command-line access) to escalate privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30232
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09332
published_at 2026-04-21T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09235
published_at 2026-04-02T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.0929
published_at 2026-04-13T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09182
published_at 2026-04-16T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.0918
published_at 2026-04-18T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09284
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09202
published_at 2026-04-07T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09278
published_at 2026-04-08T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09322
published_at 2026-04-09T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09331
published_at 2026-04-11T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09303
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30232
1
reference_url https://security.archlinux.org/ASA-202503-1
reference_id ASA-202503-1
reference_type
scores
url https://security.archlinux.org/ASA-202503-1
2
reference_url https://security.archlinux.org/AVG-2859
reference_id AVG-2859
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2859
3
reference_url https://www.exim.org/static/doc/security/CVE-2025-30232.txt
reference_id CVE-2025-30232.txt
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-28T14:37:01Z/
url https://www.exim.org/static/doc/security/CVE-2025-30232.txt
4
reference_url https://usn.ubuntu.com/7373-1/
reference_id USN-7373-1
reference_type
scores
url https://usn.ubuntu.com/7373-1/
fixed_packages
0
url pkg:deb/debian/exim4@0?distro=trixie
purl pkg:deb/debian/exim4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@0%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.1-2?distro=trixie
purl pkg:deb/debian/exim4@4.98.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.1-2%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2025-30232
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9ru-hveg-jke3
32
url VCID-kh8n-3nvr-quhj
vulnerability_id VCID-kh8n-3nvr-quhj
summary exim: Exim: Remote heap corruption vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-67896.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-67896.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-67896
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25091
published_at 2026-04-02T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24904
published_at 2026-04-07T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25129
published_at 2026-04-04T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24973
published_at 2026-04-08T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.25017
published_at 2026-04-09T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25031
published_at 2026-04-11T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24991
published_at 2026-04-12T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24937
published_at 2026-04-13T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29765
published_at 2026-04-16T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29743
published_at 2026-04-18T12:55:00Z
10
value 0.00112
scoring_system epss
scoring_elements 0.29699
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-67896
2
reference_url https://www.openwall.com/lists/oss-security/2025/12/11/2
reference_id 2
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-15T21:27:33Z/
url https://www.openwall.com/lists/oss-security/2025/12/11/2
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2422034
reference_id 2422034
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2422034
4
reference_url https://exim.org/static/doc/security/EXIM-Security-2025-12-09.1/report.txt
reference_id report.txt
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-15T21:27:33Z/
url https://exim.org/static/doc/security/EXIM-Security-2025-12-09.1/report.txt
5
reference_url https://exim.org/static/doc/security/
reference_id security
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-15T21:27:33Z/
url https://exim.org/static/doc/security/
fixed_packages
0
url pkg:deb/debian/exim4@0?distro=trixie
purl pkg:deb/debian/exim4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@0%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99-7?distro=trixie
purl pkg:deb/debian/exim4@4.99-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99-7%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2025-67896
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kh8n-3nvr-quhj
33
url VCID-kxtk-ybzc-eyfj
vulnerability_id VCID-kxtk-ybzc-eyfj
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28008
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30234
published_at 2026-04-21T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30329
published_at 2026-04-12T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30282
published_at 2026-04-13T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30296
published_at 2026-04-16T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30278
published_at 2026-04-18T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30277
published_at 2026-04-07T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30336
published_at 2026-04-08T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.3037
published_at 2026-04-09T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30373
published_at 2026-04-11T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34186
published_at 2026-04-02T12:55:00Z
10
value 0.0014
scoring_system epss
scoring_elements 0.34219
published_at 2026-04-04T12:55:00Z
11
value 0.0014
scoring_system epss
scoring_elements 0.33848
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28008
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
21
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28008
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kxtk-ybzc-eyfj
34
url VCID-m8mt-ya9x-yqaq
vulnerability_id VCID-m8mt-ya9x-yqaq
summary The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38371
reference_id
reference_type
scores
0
value 0.02209
scoring_system epss
scoring_elements 0.84479
published_at 2026-04-21T12:55:00Z
1
value 0.02209
scoring_system epss
scoring_elements 0.84382
published_at 2026-04-01T12:55:00Z
2
value 0.02209
scoring_system epss
scoring_elements 0.84397
published_at 2026-04-02T12:55:00Z
3
value 0.02209
scoring_system epss
scoring_elements 0.84417
published_at 2026-04-04T12:55:00Z
4
value 0.02209
scoring_system epss
scoring_elements 0.8442
published_at 2026-04-07T12:55:00Z
5
value 0.02209
scoring_system epss
scoring_elements 0.84441
published_at 2026-04-08T12:55:00Z
6
value 0.02209
scoring_system epss
scoring_elements 0.84446
published_at 2026-04-09T12:55:00Z
7
value 0.02209
scoring_system epss
scoring_elements 0.84465
published_at 2026-04-11T12:55:00Z
8
value 0.02209
scoring_system epss
scoring_elements 0.84459
published_at 2026-04-12T12:55:00Z
9
value 0.02209
scoring_system epss
scoring_elements 0.84455
published_at 2026-04-13T12:55:00Z
10
value 0.02209
scoring_system epss
scoring_elements 0.84477
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38371
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38371
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992172
reference_id 992172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992172
3
reference_url https://security.archlinux.org/AVG-2272
reference_id AVG-2272
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2272
4
reference_url https://usn.ubuntu.com/6881-1/
reference_id USN-6881-1
reference_type
scores
url https://usn.ubuntu.com/6881-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.95~RC2-1?distro=trixie
purl pkg:deb/debian/exim4@4.95~RC2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.95~RC2-1%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2021-38371
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m8mt-ya9x-yqaq
35
url VCID-mssq-pkfp-fbhg
vulnerability_id VCID-mssq-pkfp-fbhg
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28009
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.39946
published_at 2026-04-21T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.40023
published_at 2026-04-12T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40003
published_at 2026-04-13T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40053
published_at 2026-04-16T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40024
published_at 2026-04-18T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.39982
published_at 2026-04-07T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40035
published_at 2026-04-08T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.40049
published_at 2026-04-09T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.4006
published_at 2026-04-11T12:55:00Z
9
value 0.00219
scoring_system epss
scoring_elements 0.44559
published_at 2026-04-02T12:55:00Z
10
value 0.00219
scoring_system epss
scoring_elements 0.4458
published_at 2026-04-04T12:55:00Z
11
value 0.00219
scoring_system epss
scoring_elements 0.44488
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28009
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
21
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28009
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mssq-pkfp-fbhg
36
url VCID-mwem-kfpv-eqf2
vulnerability_id VCID-mwem-kfpv-eqf2
summary exim: exim: Incorrect parsing of multiline rfc2231 header filename
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39929.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39929.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-39929
reference_id
reference_type
scores
0
value 0.6031
scoring_system epss
scoring_elements 0.98284
published_at 2026-04-21T12:55:00Z
1
value 0.6031
scoring_system epss
scoring_elements 0.98285
published_at 2026-04-18T12:55:00Z
2
value 0.63532
scoring_system epss
scoring_elements 0.98401
published_at 2026-04-02T12:55:00Z
3
value 0.63915
scoring_system epss
scoring_elements 0.98434
published_at 2026-04-16T12:55:00Z
4
value 0.63915
scoring_system epss
scoring_elements 0.98429
published_at 2026-04-13T12:55:00Z
5
value 0.63915
scoring_system epss
scoring_elements 0.98426
published_at 2026-04-09T12:55:00Z
6
value 0.63915
scoring_system epss
scoring_elements 0.9842
published_at 2026-04-04T12:55:00Z
7
value 0.63915
scoring_system epss
scoring_elements 0.98422
published_at 2026-04-07T12:55:00Z
8
value 0.63915
scoring_system epss
scoring_elements 0.98425
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-39929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39929
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1075785
reference_id 1075785
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1075785
4
reference_url https://git.exim.org/exim.git/commit/1b3209b0577a9327ebb076f3b32b8a159c253f7b
reference_id 1b3209b0577a9327ebb076f3b32b8a159c253f7b
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T16:09:08Z/
url https://git.exim.org/exim.git/commit/1b3209b0577a9327ebb076f3b32b8a159c253f7b
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295819
reference_id 2295819
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295819
6
reference_url https://git.exim.org/exim.git/commit/6ce5c70cff8989418e05d01fd2a57703007a6357
reference_id 6ce5c70cff8989418e05d01fd2a57703007a6357
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T16:09:08Z/
url https://git.exim.org/exim.git/commit/6ce5c70cff8989418e05d01fd2a57703007a6357
7
reference_url https://github.com/Exim/exim/compare/exim-4.98-RC2...exim-4.98-RC3
reference_id exim-4.98-RC2...exim-4.98-RC3
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T16:09:08Z/
url https://github.com/Exim/exim/compare/exim-4.98-RC2...exim-4.98-RC3
8
reference_url https://www.rfc-editor.org/rfc/rfc2231.txt
reference_id rfc2231.txt
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T16:09:08Z/
url https://www.rfc-editor.org/rfc/rfc2231.txt
9
reference_url https://bugs.exim.org/show_bug.cgi?id=3099#c4
reference_id show_bug.cgi?id=3099#c4
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T16:09:08Z/
url https://bugs.exim.org/show_bug.cgi?id=3099#c4
10
reference_url https://usn.ubuntu.com/6939-1/
reference_id USN-6939-1
reference_type
scores
url https://usn.ubuntu.com/6939-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u5%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98~RC3-2?distro=trixie
purl pkg:deb/debian/exim4@4.98~RC3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98~RC3-2%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2024-39929
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwem-kfpv-eqf2
37
url VCID-p285-6bu3-vuh5
vulnerability_id VCID-p285-6bu3-vuh5
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00026.html
1
reference_url http://packetstormsecurity.com/files/136124/Exim-4.84-3-Local-Root-Privilege-Escalation.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/136124/Exim-4.84-3-Local-Root-Privilege-Escalation.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1531.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1531.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1531
reference_id
reference_type
scores
0
value 0.5677
scoring_system epss
scoring_elements 0.98136
published_at 2026-04-21T12:55:00Z
1
value 0.5677
scoring_system epss
scoring_elements 0.98137
published_at 2026-04-16T12:55:00Z
2
value 0.5677
scoring_system epss
scoring_elements 0.98139
published_at 2026-04-18T12:55:00Z
3
value 0.5677
scoring_system epss
scoring_elements 0.98114
published_at 2026-04-01T12:55:00Z
4
value 0.5677
scoring_system epss
scoring_elements 0.98117
published_at 2026-04-02T12:55:00Z
5
value 0.5677
scoring_system epss
scoring_elements 0.98121
published_at 2026-04-04T12:55:00Z
6
value 0.5677
scoring_system epss
scoring_elements 0.98122
published_at 2026-04-07T12:55:00Z
7
value 0.5677
scoring_system epss
scoring_elements 0.98126
published_at 2026-04-08T12:55:00Z
8
value 0.5677
scoring_system epss
scoring_elements 0.98127
published_at 2026-04-09T12:55:00Z
9
value 0.5677
scoring_system epss
scoring_elements 0.98131
published_at 2026-04-12T12:55:00Z
10
value 0.5677
scoring_system epss
scoring_elements 0.98132
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1531
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1531
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.exploit-db.com/exploits/39535/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39535/
7
reference_url https://www.exploit-db.com/exploits/39549/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39549/
8
reference_url https://www.exploit-db.com/exploits/39702/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/39702/
9
reference_url http://www.debian.org/security/2016/dsa-3517
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3517
10
reference_url http://www.exim.org/static/doc/CVE-2016-1531.txt
reference_id
reference_type
scores
url http://www.exim.org/static/doc/CVE-2016-1531.txt
11
reference_url http://www.rapid7.com/db/modules/exploit/unix/local/exim_perl_startup
reference_id
reference_type
scores
url http://www.rapid7.com/db/modules/exploit/unix/local/exim_perl_startup
12
reference_url http://www.securitytracker.com/id/1035512
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035512
13
reference_url http://www.ubuntu.com/usn/USN-2933-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2933-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1314293
reference_id 1314293
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1314293
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
16
reference_url http://legalhackers.com/advisories/Exim-Local-Root-Privilege-Escalation.txt
reference_id CVE-2016-1531
reference_type exploit
scores
url http://legalhackers.com/advisories/Exim-Local-Root-Privilege-Escalation.txt
17
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39535.sh
reference_id CVE-2016-1531
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39535.sh
18
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39549.txt
reference_id CVE-2016-1531
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39549.txt
19
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39702.rb
reference_id CVE-2016-1531
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39702.rb
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1531
reference_id CVE-2016-1531
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1531
21
reference_url https://usn.ubuntu.com/2933-1/
reference_id USN-2933-1
reference_type
scores
url https://usn.ubuntu.com/2933-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.86.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.86.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.86.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2016-1531
risk_score 10.0
exploitability 2.0
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p285-6bu3-vuh5
38
url VCID-pdm2-w3dk-p7gd
vulnerability_id VCID-pdm2-w3dk-p7gd
summary
Multiple vulnerabilities were found in Exim, the worst of which
    leading to remote execution of arbitrary code with root privileges.
references
0
reference_url ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74
reference_id
reference_type
scores
url ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74
1
reference_url http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html
reference_id
reference_type
scores
url http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
3
reference_url http://osvdb.org/70696
reference_id
reference_type
scores
url http://osvdb.org/70696
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0017.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0017.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0017
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30676
published_at 2026-04-21T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30706
published_at 2026-04-01T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30838
published_at 2026-04-02T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30884
published_at 2026-04-04T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-07T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30761
published_at 2026-04-08T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30793
published_at 2026-04-09T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30796
published_at 2026-04-11T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30752
published_at 2026-04-12T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30705
published_at 2026-04-13T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.3073
published_at 2026-04-16T12:55:00Z
11
value 0.00118
scoring_system epss
scoring_elements 0.3071
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0017
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0017
7
reference_url http://secunia.com/advisories/43101
reference_id
reference_type
scores
url http://secunia.com/advisories/43101
8
reference_url http://secunia.com/advisories/43128
reference_id
reference_type
scores
url http://secunia.com/advisories/43128
9
reference_url http://secunia.com/advisories/43243
reference_id
reference_type
scores
url http://secunia.com/advisories/43243
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65028
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65028
11
reference_url http://www.debian.org/security/2011/dsa-2154
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2154
12
reference_url http://www.securityfocus.com/bid/46065
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46065
13
reference_url http://www.ubuntu.com/usn/USN-1060-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1060-1
14
reference_url http://www.vupen.com/english/advisories/2011/0224
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0224
15
reference_url http://www.vupen.com/english/advisories/2011/0245
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0245
16
reference_url http://www.vupen.com/english/advisories/2011/0364
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0364
17
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=670945
reference_id 670945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=670945
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0017
reference_id CVE-2011-0017
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0017
87
reference_url https://security.gentoo.org/glsa/201401-32
reference_id GLSA-201401-32
reference_type
scores
url https://security.gentoo.org/glsa/201401-32
88
reference_url https://usn.ubuntu.com/1060-1/
reference_id USN-1060-1
reference_type
scores
url https://usn.ubuntu.com/1060-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.72-4?distro=trixie
purl pkg:deb/debian/exim4@4.72-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.72-4%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2011-0017
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pdm2-w3dk-p7gd
39
url VCID-ppju-pcvp-4khj
vulnerability_id VCID-ppju-pcvp-4khj
summary exim: Exim: remote SQL injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26794.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26794.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26794
reference_id
reference_type
scores
0
value 0.74732
scoring_system epss
scoring_elements 0.98852
published_at 2026-04-02T12:55:00Z
1
value 0.74732
scoring_system epss
scoring_elements 0.98869
published_at 2026-04-21T12:55:00Z
2
value 0.74732
scoring_system epss
scoring_elements 0.98854
published_at 2026-04-04T12:55:00Z
3
value 0.74732
scoring_system epss
scoring_elements 0.98855
published_at 2026-04-07T12:55:00Z
4
value 0.74732
scoring_system epss
scoring_elements 0.98856
published_at 2026-04-09T12:55:00Z
5
value 0.74732
scoring_system epss
scoring_elements 0.98859
published_at 2026-04-12T12:55:00Z
6
value 0.74732
scoring_system epss
scoring_elements 0.9886
published_at 2026-04-13T12:55:00Z
7
value 0.74732
scoring_system epss
scoring_elements 0.98864
published_at 2026-04-16T12:55:00Z
8
value 0.74732
scoring_system epss
scoring_elements 0.98865
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26794
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346981
reference_id 2346981
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2346981
3
reference_url https://github.com/NixOS/nixpkgs/pull/383926
reference_id 383926
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://github.com/NixOS/nixpkgs/pull/383926
4
reference_url https://github.com/openbsd/ports/commit/584d2c49addce9ca0ae67882cc16969104d7f82d
reference_id 584d2c49addce9ca0ae67882cc16969104d7f82d
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://github.com/openbsd/ports/commit/584d2c49addce9ca0ae67882cc16969104d7f82d
5
reference_url https://code.exim.org/exim/exim/commit/bfe32b5c6ea033736a26da8421513206db9fe305
reference_id bfe32b5c6ea033736a26da8421513206db9fe305
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://code.exim.org/exim/exim/commit/bfe32b5c6ea033736a26da8421513206db9fe305
6
reference_url https://www.exim.org/static/doc/security/CVE-2025-26794.txt
reference_id CVE-2025-26794.txt
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://www.exim.org/static/doc/security/CVE-2025-26794.txt
7
reference_url https://exim.org
reference_id exim.org
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://exim.org
8
reference_url https://github.com/Exim/exim/wiki/EximSecurity
reference_id EximSecurity
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://github.com/Exim/exim/wiki/EximSecurity
9
reference_url https://exim.org/static/doc/security/EXIM-Security-2025-12-09.1/report.txt
reference_id report.txt
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://exim.org/static/doc/security/EXIM-Security-2025-12-09.1/report.txt
10
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1237424
reference_id show_bug.cgi?id=1237424
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-21T16:11:25Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1237424
fixed_packages
0
url pkg:deb/debian/exim4@0?distro=trixie
purl pkg:deb/debian/exim4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@0%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98-4?distro=trixie
purl pkg:deb/debian/exim4@4.98-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98-4%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2025-26794
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ppju-pcvp-4khj
40
url VCID-puuy-w6ze-9kc7
vulnerability_id VCID-puuy-w6ze-9kc7
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42119.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42119.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42119
reference_id
reference_type
scores
0
value 0.00731
scoring_system epss
scoring_elements 0.72637
published_at 2026-04-02T12:55:00Z
1
value 0.00731
scoring_system epss
scoring_elements 0.72725
published_at 2026-04-21T12:55:00Z
2
value 0.00731
scoring_system epss
scoring_elements 0.72722
published_at 2026-04-16T12:55:00Z
3
value 0.00731
scoring_system epss
scoring_elements 0.72733
published_at 2026-04-18T12:55:00Z
4
value 0.00731
scoring_system epss
scoring_elements 0.72654
published_at 2026-04-04T12:55:00Z
5
value 0.00731
scoring_system epss
scoring_elements 0.72632
published_at 2026-04-07T12:55:00Z
6
value 0.00731
scoring_system epss
scoring_elements 0.72671
published_at 2026-04-08T12:55:00Z
7
value 0.00731
scoring_system epss
scoring_elements 0.72684
published_at 2026-04-09T12:55:00Z
8
value 0.00731
scoring_system epss
scoring_elements 0.72707
published_at 2026-04-11T12:55:00Z
9
value 0.00731
scoring_system epss
scoring_elements 0.7269
published_at 2026-04-12T12:55:00Z
10
value 0.00731
scoring_system epss
scoring_elements 0.7268
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42119
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42119
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241542
reference_id 2241542
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241542
4
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
5
reference_url https://usn.ubuntu.com/6455-1/
reference_id USN-6455-1
reference_type
scores
url https://usn.ubuntu.com/6455-1/
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-1473/
reference_id ZDI-23-1473
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T16:29:47Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-1473/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.97~RC2-2?distro=trixie
purl pkg:deb/debian/exim4@4.97~RC2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.97~RC2-2%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
6
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2023-42119
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-puuy-w6ze-9kc7
41
url VCID-pzsv-7fee-1ugu
vulnerability_id VCID-pzsv-7fee-1ugu
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28018
reference_id
reference_type
scores
0
value 0.65912
scoring_system epss
scoring_elements 0.98517
published_at 2026-04-21T12:55:00Z
1
value 0.76461
scoring_system epss
scoring_elements 0.98928
published_at 2026-04-02T12:55:00Z
2
value 0.76461
scoring_system epss
scoring_elements 0.9893
published_at 2026-04-04T12:55:00Z
3
value 0.76461
scoring_system epss
scoring_elements 0.98927
published_at 2026-04-01T12:55:00Z
4
value 0.78667
scoring_system epss
scoring_elements 0.9904
published_at 2026-04-07T12:55:00Z
5
value 0.78667
scoring_system epss
scoring_elements 0.99041
published_at 2026-04-08T12:55:00Z
6
value 0.78667
scoring_system epss
scoring_elements 0.99042
published_at 2026-04-11T12:55:00Z
7
value 0.78667
scoring_system epss
scoring_elements 0.99043
published_at 2026-04-13T12:55:00Z
8
value 0.78667
scoring_system epss
scoring_elements 0.99044
published_at 2026-04-16T12:55:00Z
9
value 0.78667
scoring_system epss
scoring_elements 0.99045
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28018
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28018
2
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
3
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
4
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28018
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pzsv-7fee-1ugu
42
url VCID-q8zm-fhfq-sfan
vulnerability_id VCID-q8zm-fhfq-sfan
summary A vulnerability was found in Exim and classified as problematic. This issue affects the function dmarc_dns_lookup of the file dmarc.c of the component DMARC Handler. The manipulation leads to use after free. The attack may be initiated remotely. The name of the patch is 12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211919.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3620
reference_id
reference_type
scores
0
value 0.01227
scoring_system epss
scoring_elements 0.79087
published_at 2026-04-02T12:55:00Z
1
value 0.01227
scoring_system epss
scoring_elements 0.79114
published_at 2026-04-04T12:55:00Z
2
value 0.01227
scoring_system epss
scoring_elements 0.79099
published_at 2026-04-07T12:55:00Z
3
value 0.01227
scoring_system epss
scoring_elements 0.79124
published_at 2026-04-08T12:55:00Z
4
value 0.01227
scoring_system epss
scoring_elements 0.79131
published_at 2026-04-09T12:55:00Z
5
value 0.01227
scoring_system epss
scoring_elements 0.79156
published_at 2026-04-18T12:55:00Z
6
value 0.01227
scoring_system epss
scoring_elements 0.79142
published_at 2026-04-12T12:55:00Z
7
value 0.01227
scoring_system epss
scoring_elements 0.79132
published_at 2026-04-13T12:55:00Z
8
value 0.01227
scoring_system epss
scoring_elements 0.79159
published_at 2026-04-16T12:55:00Z
9
value 0.01227
scoring_system epss
scoring_elements 0.79155
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3620
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022556
reference_id 1022556
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022556
2
reference_url https://git.exim.org/exim.git/commit/12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445
reference_id 12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:15Z/
url https://git.exim.org/exim.git/commit/12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/667V3ADXQ2MHUJMSXA3VZZEWLVSCIBEU/
reference_id 667V3ADXQ2MHUJMSXA3VZZEWLVSCIBEU
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/667V3ADXQ2MHUJMSXA3VZZEWLVSCIBEU/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/
reference_id EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EIH4W5R7SHTUEQFWWKB4TUO5YFZX64KV/
5
reference_url https://vuldb.com/?id.211919
reference_id ?id.211919
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:15Z/
url https://vuldb.com/?id.211919
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XV2K2AWF62FSJ64B5CUZPFT4COK7P5PM/
reference_id XV2K2AWF62FSJ64B5CUZPFT4COK7P5PM
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XV2K2AWF62FSJ64B5CUZPFT4COK7P5PM/
fixed_packages
0
url pkg:deb/debian/exim4@0?distro=trixie
purl pkg:deb/debian/exim4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@0%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-7?distro=trixie
purl pkg:deb/debian/exim4@4.96-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2022-3620
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8zm-fhfq-sfan
43
url VCID-qr4y-643y-dqdz
vulnerability_id VCID-qr4y-643y-dqdz
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28010
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31841
published_at 2026-04-21T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.3189
published_at 2026-04-12T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31857
published_at 2026-04-13T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31889
published_at 2026-04-16T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31868
published_at 2026-04-18T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31844
published_at 2026-04-07T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31896
published_at 2026-04-08T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31925
published_at 2026-04-09T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.3193
published_at 2026-04-11T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35879
published_at 2026-04-02T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35909
published_at 2026-04-04T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35681
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28010
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28010
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qr4y-643y-dqdz
44
url VCID-qupq-a4jw-bbhh
vulnerability_id VCID-qupq-a4jw-bbhh
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42114.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42114.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42114
reference_id
reference_type
scores
0
value 0.13895
scoring_system epss
scoring_elements 0.94276
published_at 2026-04-02T12:55:00Z
1
value 0.13895
scoring_system epss
scoring_elements 0.94327
published_at 2026-04-21T12:55:00Z
2
value 0.13895
scoring_system epss
scoring_elements 0.94323
published_at 2026-04-16T12:55:00Z
3
value 0.13895
scoring_system epss
scoring_elements 0.94328
published_at 2026-04-18T12:55:00Z
4
value 0.13895
scoring_system epss
scoring_elements 0.94287
published_at 2026-04-04T12:55:00Z
5
value 0.13895
scoring_system epss
scoring_elements 0.94289
published_at 2026-04-07T12:55:00Z
6
value 0.13895
scoring_system epss
scoring_elements 0.94298
published_at 2026-04-08T12:55:00Z
7
value 0.13895
scoring_system epss
scoring_elements 0.94302
published_at 2026-04-09T12:55:00Z
8
value 0.13895
scoring_system epss
scoring_elements 0.94306
published_at 2026-04-11T12:55:00Z
9
value 0.13895
scoring_system epss
scoring_elements 0.94307
published_at 2026-04-12T12:55:00Z
10
value 0.13895
scoring_system epss
scoring_elements 0.94308
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42114
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42114
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42116
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241538
reference_id 2241538
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241538
6
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
7
reference_url https://usn.ubuntu.com/6411-1/
reference_id USN-6411-1
reference_type
scores
url https://usn.ubuntu.com/6411-1/
8
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-1468/
reference_id ZDI-23-1468
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T17:07:34Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-1468/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.97~RC1-2?distro=trixie
purl pkg:deb/debian/exim4@4.97~RC1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.97~RC1-2%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
6
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2023-42114
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qupq-a4jw-bbhh
45
url VCID-qyqw-2gga-m3c6
vulnerability_id VCID-qyqw-2gga-m3c6
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28020
reference_id
reference_type
scores
0
value 0.19796
scoring_system epss
scoring_elements 0.95417
published_at 2026-04-02T12:55:00Z
1
value 0.19796
scoring_system epss
scoring_elements 0.95423
published_at 2026-04-04T12:55:00Z
2
value 0.19796
scoring_system epss
scoring_elements 0.95408
published_at 2026-04-01T12:55:00Z
3
value 0.21063
scoring_system epss
scoring_elements 0.95642
published_at 2026-04-09T12:55:00Z
4
value 0.21063
scoring_system epss
scoring_elements 0.95646
published_at 2026-04-12T12:55:00Z
5
value 0.21063
scoring_system epss
scoring_elements 0.95648
published_at 2026-04-13T12:55:00Z
6
value 0.21063
scoring_system epss
scoring_elements 0.95657
published_at 2026-04-16T12:55:00Z
7
value 0.21063
scoring_system epss
scoring_elements 0.9566
published_at 2026-04-18T12:55:00Z
8
value 0.21063
scoring_system epss
scoring_elements 0.95662
published_at 2026-04-21T12:55:00Z
9
value 0.21063
scoring_system epss
scoring_elements 0.9563
published_at 2026-04-07T12:55:00Z
10
value 0.21063
scoring_system epss
scoring_elements 0.95638
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28020
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28020
2
reference_url https://security.archlinux.org/AVG-1912
reference_id AVG-1912
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1912
3
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
4
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
5
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.92~RC5-1?distro=trixie
purl pkg:deb/debian/exim4@4.92~RC5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.92~RC5-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28020
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qyqw-2gga-m3c6
46
url VCID-raam-5am9-hbef
vulnerability_id VCID-raam-5am9-hbef
summary
A vulnerability in Exim could allow a remote attacker to execute
    arbitrary commands.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10149.json
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10149.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10149
reference_id
reference_type
scores
0
value 0.93918
scoring_system epss
scoring_elements 0.99878
published_at 2026-04-12T12:55:00Z
1
value 0.93918
scoring_system epss
scoring_elements 0.99879
published_at 2026-04-21T12:55:00Z
2
value 0.93918
scoring_system epss
scoring_elements 0.99876
published_at 2026-04-01T12:55:00Z
3
value 0.93918
scoring_system epss
scoring_elements 0.99877
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10149
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10149
3
reference_url http://www.securityfocus.com/bid/108679
reference_id 108679
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url http://www.securityfocus.com/bid/108679
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1715237
reference_id 1715237
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1715237
5
reference_url http://www.openwall.com/lists/oss-security/2019/06/05/2
reference_id 2
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url http://www.openwall.com/lists/oss-security/2019/06/05/2
6
reference_url http://www.openwall.com/lists/oss-security/2019/06/05/3
reference_id 3
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url http://www.openwall.com/lists/oss-security/2019/06/05/3
7
reference_url http://www.openwall.com/lists/oss-security/2019/07/26/4
reference_id 4
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url http://www.openwall.com/lists/oss-security/2019/07/26/4
8
reference_url https://seclists.org/bugtraq/2019/Jun/5
reference_id 5
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url https://seclists.org/bugtraq/2019/Jun/5
9
reference_url http://www.openwall.com/lists/oss-security/2019/07/25/6
reference_id 6
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url http://www.openwall.com/lists/oss-security/2019/07/25/6
10
reference_url http://www.openwall.com/lists/oss-security/2019/07/25/7
reference_id 7
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url http://www.openwall.com/lists/oss-security/2019/07/25/7
11
reference_url https://security.archlinux.org/AVG-982
reference_id AVG-982
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-982
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46996.sh
reference_id CVE-2019-10149
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46996.sh
13
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47307.rb
reference_id CVE-2019-10149
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47307.rb
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/46974.txt
reference_id CVE-2019-10149
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/46974.txt
15
reference_url https://lwn.net/Articles/790553/
reference_id CVE-2019-10149
reference_type exploit
scores
url https://lwn.net/Articles/790553/
16
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
reference_id CVE-2019-10149
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
17
reference_url https://www.exim.org/static/doc/security/CVE-2019-10149.txt
reference_id CVE-2019-10149.txt
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url https://www.exim.org/static/doc/security/CVE-2019-10149.txt
18
reference_url https://www.debian.org/security/2019/dsa-4456
reference_id dsa-4456
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url https://www.debian.org/security/2019/dsa-4456
19
reference_url http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html
reference_id Exim-4.91-Local-Privilege-Escalation.html
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html
20
reference_url http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html
reference_id Exim-4.91-Local-Privilege-Escalation.html
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html
21
reference_url http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html
reference_id Exim-4.9.1-Remote-Command-Execution.html
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html
22
reference_url https://security.gentoo.org/glsa/201906-01
reference_id GLSA-201906-01
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url https://security.gentoo.org/glsa/201906-01
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00020.html
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149
reference_id show_bug.cgi?id=CVE-2019-10149
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149
25
reference_url https://usn.ubuntu.com/4010-1/
reference_id USN-4010-1
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:31:13Z/
url https://usn.ubuntu.com/4010-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.92~RC3-1?distro=trixie
purl pkg:deb/debian/exim4@4.92~RC3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.92~RC3-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2019-10149
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-raam-5am9-hbef
47
url VCID-rfam-rzrr-abhb
vulnerability_id VCID-rfam-rzrr-abhb
summary
Multiple vulnerabilities were found in Exim, the worst of which
    leading to remote execution of arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1764.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1764.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1764
reference_id
reference_type
scores
0
value 0.0353
scoring_system epss
scoring_elements 0.87605
published_at 2026-04-01T12:55:00Z
1
value 0.0353
scoring_system epss
scoring_elements 0.87614
published_at 2026-04-02T12:55:00Z
2
value 0.0353
scoring_system epss
scoring_elements 0.87628
published_at 2026-04-04T12:55:00Z
3
value 0.04718
scoring_system epss
scoring_elements 0.89356
published_at 2026-04-07T12:55:00Z
4
value 0.04718
scoring_system epss
scoring_elements 0.89372
published_at 2026-04-08T12:55:00Z
5
value 0.04718
scoring_system epss
scoring_elements 0.89376
published_at 2026-04-09T12:55:00Z
6
value 0.04718
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-11T12:55:00Z
7
value 0.04718
scoring_system epss
scoring_elements 0.89382
published_at 2026-04-12T12:55:00Z
8
value 0.04718
scoring_system epss
scoring_elements 0.89378
published_at 2026-04-13T12:55:00Z
9
value 0.04718
scoring_system epss
scoring_elements 0.89393
published_at 2026-04-18T12:55:00Z
10
value 0.04718
scoring_system epss
scoring_elements 0.8939
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1764
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1764
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624670
reference_id 624670
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624670
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=702474
reference_id 702474
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=702474
5
reference_url https://security.gentoo.org/glsa/201401-32
reference_id GLSA-201401-32
reference_type
scores
url https://security.gentoo.org/glsa/201401-32
6
reference_url https://usn.ubuntu.com/1130-1/
reference_id USN-1130-1
reference_type
scores
url https://usn.ubuntu.com/1130-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.75-3?distro=trixie
purl pkg:deb/debian/exim4@4.75-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.75-3%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2011-1764
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rfam-rzrr-abhb
48
url VCID-rgkw-1sqv-d7hx
vulnerability_id VCID-rgkw-1sqv-d7hx
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28016
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35596
published_at 2026-04-21T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.3564
published_at 2026-04-12T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35618
published_at 2026-04-13T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35657
published_at 2026-04-16T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.35647
published_at 2026-04-18T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35606
published_at 2026-04-07T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35652
published_at 2026-04-08T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.35675
published_at 2026-04-09T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35684
published_at 2026-04-11T12:55:00Z
9
value 0.00181
scoring_system epss
scoring_elements 0.39752
published_at 2026-04-02T12:55:00Z
10
value 0.00181
scoring_system epss
scoring_elements 0.39774
published_at 2026-04-04T12:55:00Z
11
value 0.00181
scoring_system epss
scoring_elements 0.39604
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28016
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28016
2
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
3
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
4
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
5
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28016
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rgkw-1sqv-d7hx
49
url VCID-rrea-52kb-3qf1
vulnerability_id VCID-rrea-52kb-3qf1
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url http://openwall.com/lists/oss-security/2017/11/25/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/11/25/1
1
reference_url http://openwall.com/lists/oss-security/2017/11/25/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/11/25/2
2
reference_url http://openwall.com/lists/oss-security/2017/11/25/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/11/25/3
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16944.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16944.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16944
reference_id
reference_type
scores
0
value 0.76031
scoring_system epss
scoring_elements 0.98908
published_at 2026-04-01T12:55:00Z
1
value 0.76031
scoring_system epss
scoring_elements 0.98925
published_at 2026-04-21T12:55:00Z
2
value 0.76031
scoring_system epss
scoring_elements 0.98918
published_at 2026-04-13T12:55:00Z
3
value 0.76031
scoring_system epss
scoring_elements 0.9892
published_at 2026-04-16T12:55:00Z
4
value 0.76031
scoring_system epss
scoring_elements 0.98922
published_at 2026-04-18T12:55:00Z
5
value 0.76031
scoring_system epss
scoring_elements 0.9891
published_at 2026-04-02T12:55:00Z
6
value 0.76031
scoring_system epss
scoring_elements 0.98912
published_at 2026-04-04T12:55:00Z
7
value 0.76031
scoring_system epss
scoring_elements 0.98914
published_at 2026-04-07T12:55:00Z
8
value 0.76031
scoring_system epss
scoring_elements 0.98916
published_at 2026-04-08T12:55:00Z
9
value 0.76031
scoring_system epss
scoring_elements 0.98915
published_at 2026-04-09T12:55:00Z
10
value 0.76031
scoring_system epss
scoring_elements 0.98917
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16944
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16943
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16944
7
reference_url https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html
reference_id
reference_type
scores
url https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html
8
reference_url https://www.debian.org/security/2017/dsa-4053
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4053
9
reference_url https://www.exploit-db.com/exploits/43184/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/43184/
10
reference_url http://www.openwall.com/lists/oss-security/2021/05/04/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2021/05/04/7
11
reference_url http://www.securitytracker.com/id/1039873
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039873
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1517684
reference_id 1517684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1517684
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882671
reference_id 882671
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882671
14
reference_url https://security.archlinux.org/ASA-201711-32
reference_id ASA-201711-32
reference_type
scores
url https://security.archlinux.org/ASA-201711-32
15
reference_url https://security.archlinux.org/AVG-518
reference_id AVG-518
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-518
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.88:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.88:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.88:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.89:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.89:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.89:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
19
reference_url https://bugs.exim.org/show_bug.cgi?id=2201
reference_id CVE-2017-16944
reference_type exploit
scores
url https://bugs.exim.org/show_bug.cgi?id=2201
20
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/43184.txt
reference_id CVE-2017-16944
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/43184.txt
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16944
reference_id CVE-2017-16944
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16944
22
reference_url https://security.gentoo.org/glsa/201803-01
reference_id GLSA-201803-01
reference_type
scores
url https://security.gentoo.org/glsa/201803-01
23
reference_url https://usn.ubuntu.com/3499-1/
reference_id USN-3499-1
reference_type
scores
url https://usn.ubuntu.com/3499-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.89-13?distro=trixie
purl pkg:deb/debian/exim4@4.89-13?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.89-13%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2017-16944
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rrea-52kb-3qf1
50
url VCID-sam4-h21q-dkej
vulnerability_id VCID-sam4-h21q-dkej
summary
Multiple vulnerabilities were found in Exim, the worst of which
    leading to remote execution of arbitrary code with root privileges.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091664.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091664.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090900.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090900.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090963.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090963.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00018.html
4
reference_url http://osvdb.org/86616
reference_id
reference_type
scores
url http://osvdb.org/86616
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5671.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5671.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5671
reference_id
reference_type
scores
0
value 0.35729
scoring_system epss
scoring_elements 0.97088
published_at 2026-04-21T12:55:00Z
1
value 0.35729
scoring_system epss
scoring_elements 0.97044
published_at 2026-04-01T12:55:00Z
2
value 0.35729
scoring_system epss
scoring_elements 0.97051
published_at 2026-04-02T12:55:00Z
3
value 0.35729
scoring_system epss
scoring_elements 0.97055
published_at 2026-04-04T12:55:00Z
4
value 0.35729
scoring_system epss
scoring_elements 0.97056
published_at 2026-04-07T12:55:00Z
5
value 0.35729
scoring_system epss
scoring_elements 0.97065
published_at 2026-04-08T12:55:00Z
6
value 0.35729
scoring_system epss
scoring_elements 0.97066
published_at 2026-04-09T12:55:00Z
7
value 0.35729
scoring_system epss
scoring_elements 0.9707
published_at 2026-04-12T12:55:00Z
8
value 0.35729
scoring_system epss
scoring_elements 0.97071
published_at 2026-04-13T12:55:00Z
9
value 0.35729
scoring_system epss
scoring_elements 0.97081
published_at 2026-04-16T12:55:00Z
10
value 0.35729
scoring_system epss
scoring_elements 0.97084
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5671
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5671
8
reference_url http://secunia.com/advisories/51098
reference_id
reference_type
scores
url http://secunia.com/advisories/51098
9
reference_url http://secunia.com/advisories/51115
reference_id
reference_type
scores
url http://secunia.com/advisories/51115
10
reference_url http://secunia.com/advisories/51153
reference_id
reference_type
scores
url http://secunia.com/advisories/51153
11
reference_url http://secunia.com/advisories/51155
reference_id
reference_type
scores
url http://secunia.com/advisories/51155
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79615
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79615
13
reference_url https://lists.exim.org/lurker/message/20121026.080330.74b9147b.en.html
reference_id
reference_type
scores
url https://lists.exim.org/lurker/message/20121026.080330.74b9147b.en.html
14
reference_url http://www.debian.org/security/2012/dsa-2566
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2566
15
reference_url http://www.openwall.com/lists/oss-security/2012/10/26/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/10/26/5
16
reference_url http://www.securityfocus.com/bid/56285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56285
17
reference_url http://www.ubuntu.com/usn/USN-1618-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1618-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=869953
reference_id 869953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=869953
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.76:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.76:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.76:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.77:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.77:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.77:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.80:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5671
reference_id CVE-2012-5671
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5671
29
reference_url https://security.gentoo.org/glsa/201401-32
reference_id GLSA-201401-32
reference_type
scores
url https://security.gentoo.org/glsa/201401-32
30
reference_url https://usn.ubuntu.com/1618-1/
reference_id USN-1618-1
reference_type
scores
url https://usn.ubuntu.com/1618-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.80-5.1?distro=trixie
purl pkg:deb/debian/exim4@4.80-5.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.80-5.1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2012-5671
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sam4-h21q-dkej
51
url VCID-stsb-pwen-87g7
vulnerability_id VCID-stsb-pwen-87g7
summary Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-51766
reference_id
reference_type
scores
0
value 0.01642
scoring_system epss
scoring_elements 0.81898
published_at 2026-04-02T12:55:00Z
1
value 0.01642
scoring_system epss
scoring_elements 0.81921
published_at 2026-04-04T12:55:00Z
2
value 0.01642
scoring_system epss
scoring_elements 0.81917
published_at 2026-04-07T12:55:00Z
3
value 0.01642
scoring_system epss
scoring_elements 0.81944
published_at 2026-04-08T12:55:00Z
4
value 0.01642
scoring_system epss
scoring_elements 0.81951
published_at 2026-04-09T12:55:00Z
5
value 0.01642
scoring_system epss
scoring_elements 0.81971
published_at 2026-04-11T12:55:00Z
6
value 0.01642
scoring_system epss
scoring_elements 0.8196
published_at 2026-04-12T12:55:00Z
7
value 0.01642
scoring_system epss
scoring_elements 0.81955
published_at 2026-04-13T12:55:00Z
8
value 0.01642
scoring_system epss
scoring_elements 0.8199
published_at 2026-04-18T12:55:00Z
9
value 0.01642
scoring_system epss
scoring_elements 0.81992
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-51766
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51766
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059387
reference_id 1059387
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059387
3
reference_url https://security.gentoo.org/glsa/202402-18
reference_id GLSA-202402-18
reference_type
scores
url https://security.gentoo.org/glsa/202402-18
4
reference_url https://usn.ubuntu.com/6611-1/
reference_id USN-6611-1
reference_type
scores
url https://usn.ubuntu.com/6611-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.97-3?distro=trixie
purl pkg:deb/debian/exim4@4.97-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.97-3%3Fdistro=trixie
5
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
6
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2023-51766
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stsb-pwen-87g7
52
url VCID-swer-ztd6-nkga
vulnerability_id VCID-swer-ztd6-nkga
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28019
reference_id
reference_type
scores
0
value 0.01682
scoring_system epss
scoring_elements 0.82149
published_at 2026-04-04T12:55:00Z
1
value 0.01682
scoring_system epss
scoring_elements 0.82115
published_at 2026-04-01T12:55:00Z
2
value 0.01682
scoring_system epss
scoring_elements 0.82128
published_at 2026-04-02T12:55:00Z
3
value 0.01824
scoring_system epss
scoring_elements 0.82873
published_at 2026-04-09T12:55:00Z
4
value 0.01824
scoring_system epss
scoring_elements 0.82889
published_at 2026-04-11T12:55:00Z
5
value 0.01824
scoring_system epss
scoring_elements 0.82884
published_at 2026-04-12T12:55:00Z
6
value 0.01824
scoring_system epss
scoring_elements 0.8288
published_at 2026-04-13T12:55:00Z
7
value 0.01824
scoring_system epss
scoring_elements 0.82919
published_at 2026-04-16T12:55:00Z
8
value 0.01824
scoring_system epss
scoring_elements 0.8292
published_at 2026-04-18T12:55:00Z
9
value 0.01824
scoring_system epss
scoring_elements 0.82922
published_at 2026-04-21T12:55:00Z
10
value 0.01824
scoring_system epss
scoring_elements 0.82841
published_at 2026-04-07T12:55:00Z
11
value 0.01824
scoring_system epss
scoring_elements 0.82866
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28019
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28019
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-swer-ztd6-nkga
53
url VCID-teft-hqz3-7ubr
vulnerability_id VCID-teft-hqz3-7ubr
summary exim: remote arbitrary code execution via DMARC code parsing
references
0
reference_url http://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0
reference_id
reference_type
scores
url http://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2957.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2957.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2957
reference_id
reference_type
scores
0
value 0.01821
scoring_system epss
scoring_elements 0.82911
published_at 2026-04-21T12:55:00Z
1
value 0.01821
scoring_system epss
scoring_elements 0.82875
published_at 2026-04-12T12:55:00Z
2
value 0.01821
scoring_system epss
scoring_elements 0.82871
published_at 2026-04-13T12:55:00Z
3
value 0.01821
scoring_system epss
scoring_elements 0.8291
published_at 2026-04-16T12:55:00Z
4
value 0.01821
scoring_system epss
scoring_elements 0.82909
published_at 2026-04-18T12:55:00Z
5
value 0.01821
scoring_system epss
scoring_elements 0.82832
published_at 2026-04-07T12:55:00Z
6
value 0.01821
scoring_system epss
scoring_elements 0.82857
published_at 2026-04-08T12:55:00Z
7
value 0.01821
scoring_system epss
scoring_elements 0.82864
published_at 2026-04-09T12:55:00Z
8
value 0.01821
scoring_system epss
scoring_elements 0.8288
published_at 2026-04-11T12:55:00Z
9
value 0.02176
scoring_system epss
scoring_elements 0.84279
published_at 2026-04-02T12:55:00Z
10
value 0.02176
scoring_system epss
scoring_elements 0.84298
published_at 2026-04-04T12:55:00Z
11
value 0.02176
scoring_system epss
scoring_elements 0.84266
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2957
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2957
4
reference_url https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html
reference_id
reference_type
scores
url https://lists.exim.org/lurker/message/20140528.122536.a31d60a4.en.html
5
reference_url http://www.openwall.com/lists/oss-security/2021/05/04/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2021/05/04/7
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1101725
reference_id 1101725
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1101725
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.76:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.76:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.76:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.77:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.77:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.77:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.80:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.80.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.80.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.80.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2957
reference_id CVE-2014-2957
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-2957
fixed_packages
0
url pkg:deb/debian/exim4@4.82.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.82.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.82.1-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2014-2957
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-teft-hqz3-7ubr
54
url VCID-tpt6-ze4u-a7dt
vulnerability_id VCID-tpt6-ze4u-a7dt
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28013
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35838
published_at 2026-04-21T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35884
published_at 2026-04-12T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.3586
published_at 2026-04-13T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.359
published_at 2026-04-16T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35887
published_at 2026-04-18T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35846
published_at 2026-04-07T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35897
published_at 2026-04-08T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35919
published_at 2026-04-09T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35925
published_at 2026-04-11T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.4003
published_at 2026-04-02T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.40056
published_at 2026-04-04T12:55:00Z
11
value 0.00183
scoring_system epss
scoring_elements 0.39882
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28013
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
21
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28013
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tpt6-ze4u-a7dt
55
url VCID-u1km-244u-qugh
vulnerability_id VCID-u1km-244u-qugh
summary security flaw
references
0
reference_url http://ftp6.us.freebsd.org/pub/mail/exim/ChangeLogs/ChangeLog-4.44
reference_id
reference_type
scores
url http://ftp6.us.freebsd.org/pub/mail/exim/ChangeLogs/ChangeLog-4.44
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0021.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0021.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0021
reference_id
reference_type
scores
0
value 0.02817
scoring_system epss
scoring_elements 0.86163
published_at 2026-04-21T12:55:00Z
1
value 0.02817
scoring_system epss
scoring_elements 0.86084
published_at 2026-04-01T12:55:00Z
2
value 0.02817
scoring_system epss
scoring_elements 0.86094
published_at 2026-04-02T12:55:00Z
3
value 0.02817
scoring_system epss
scoring_elements 0.86111
published_at 2026-04-04T12:55:00Z
4
value 0.02817
scoring_system epss
scoring_elements 0.8611
published_at 2026-04-07T12:55:00Z
5
value 0.02817
scoring_system epss
scoring_elements 0.86129
published_at 2026-04-08T12:55:00Z
6
value 0.02817
scoring_system epss
scoring_elements 0.86141
published_at 2026-04-09T12:55:00Z
7
value 0.02817
scoring_system epss
scoring_elements 0.86155
published_at 2026-04-11T12:55:00Z
8
value 0.02817
scoring_system epss
scoring_elements 0.86154
published_at 2026-04-12T12:55:00Z
9
value 0.02817
scoring_system epss
scoring_elements 0.8615
published_at 2026-04-13T12:55:00Z
10
value 0.02817
scoring_system epss
scoring_elements 0.86167
published_at 2026-04-16T12:55:00Z
11
value 0.02817
scoring_system epss
scoring_elements 0.86172
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0021
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0021
4
reference_url http://security.gentoo.org/glsa/glsa-200501-23.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200501-23.xml
5
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10347
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10347
6
reference_url http://www.debian.org/security/2005/dsa-635
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-635
7
reference_url http://www.debian.org/security/2005/dsa-637
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-637
8
reference_url http://www.exim.org/mail-archives/exim-users/Week-of-Mon-20050103/msg00028.html
reference_id
reference_type
scores
url http://www.exim.org/mail-archives/exim-users/Week-of-Mon-20050103/msg00028.html
9
reference_url http://www.idefense.com/application/poi/display?id=179&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=179&type=vulnerabilities
10
reference_url http://www.idefense.com/application/poi/display?id=183&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=183&type=vulnerabilities
11
reference_url http://www.kb.cert.org/vuls/id/132992
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/132992
12
reference_url http://www.redhat.com/support/errata/RHSA-2005-025.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-025.html
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617439
reference_id 1617439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617439
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_cambridge:exim:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_cambridge:exim:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_cambridge:exim:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_cambridge:exim:4.41:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_cambridge:exim:4.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_cambridge:exim:4.41:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_cambridge:exim:4.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:university_of_cambridge:exim:4.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:university_of_cambridge:exim:4.42:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0021
reference_id CVE-2005-0021
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2005-0021
18
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/1009.c
reference_id OSVDB-12946;CVE-2005-0021
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/1009.c
19
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/756.c
reference_id OSVDB-12946;CVE-2005-0021
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/756.c
20
reference_url https://access.redhat.com/errata/RHSA-2005:025
reference_id RHSA-2005:025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:025
21
reference_url https://usn.ubuntu.com/56-1/
reference_id USN-56-1
reference_type
scores
url https://usn.ubuntu.com/56-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.34-10?distro=trixie
purl pkg:deb/debian/exim4@4.34-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.34-10%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2005-0021
risk_score 10.0
exploitability 2.0
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u1km-244u-qugh
56
url VCID-ujms-hna1-z7e6
vulnerability_id VCID-ujms-hna1-z7e6
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12783.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12783.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12783
reference_id
reference_type
scores
0
value 0.02941
scoring_system epss
scoring_elements 0.86372
published_at 2026-04-01T12:55:00Z
1
value 0.02941
scoring_system epss
scoring_elements 0.86383
published_at 2026-04-02T12:55:00Z
2
value 0.02941
scoring_system epss
scoring_elements 0.864
published_at 2026-04-04T12:55:00Z
3
value 0.03185
scoring_system epss
scoring_elements 0.86943
published_at 2026-04-07T12:55:00Z
4
value 0.03185
scoring_system epss
scoring_elements 0.86963
published_at 2026-04-08T12:55:00Z
5
value 0.03185
scoring_system epss
scoring_elements 0.8697
published_at 2026-04-09T12:55:00Z
6
value 0.03185
scoring_system epss
scoring_elements 0.86984
published_at 2026-04-11T12:55:00Z
7
value 0.03185
scoring_system epss
scoring_elements 0.86978
published_at 2026-04-12T12:55:00Z
8
value 0.03185
scoring_system epss
scoring_elements 0.86973
published_at 2026-04-13T12:55:00Z
9
value 0.03185
scoring_system epss
scoring_elements 0.86988
published_at 2026-04-16T12:55:00Z
10
value 0.03185
scoring_system epss
scoring_elements 0.86992
published_at 2026-04-18T12:55:00Z
11
value 0.03185
scoring_system epss
scoring_elements 0.8699
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12783
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12783
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1836362
reference_id 1836362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1836362
4
reference_url https://usn.ubuntu.com/4366-1/
reference_id USN-4366-1
reference_type
scores
url https://usn.ubuntu.com/4366-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.93-16?distro=trixie
purl pkg:deb/debian/exim4@4.93-16?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.93-16%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-12783
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ujms-hna1-z7e6
57
url VCID-v1t8-y73h-vyee
vulnerability_id VCID-v1t8-y73h-vyee
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28015
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35068
published_at 2026-04-21T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35152
published_at 2026-04-11T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35117
published_at 2026-04-18T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35093
published_at 2026-04-13T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35131
published_at 2026-04-16T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35077
published_at 2026-04-07T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35122
published_at 2026-04-08T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35147
published_at 2026-04-09T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39189
published_at 2026-04-02T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39211
published_at 2026-04-04T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39003
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28015
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
21
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28015
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v1t8-y73h-vyee
58
url VCID-vykx-t8yc-tycc
vulnerability_id VCID-vykx-t8yc-tycc
summary
A local attacker could execute arbitrary code by providing
    unsanitized data to a data source or escalate privileges.
references
0
reference_url http://git.exim.org/exim.git/commitdiff/7685ce68148a083d7759e78d01aa5198fc099c44
reference_id
reference_type
scores
url http://git.exim.org/exim.git/commitdiff/7685ce68148a083d7759e78d01aa5198fc099c44
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136251.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136251.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136264.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136264.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2972.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2972.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2972
reference_id
reference_type
scores
0
value 0.00213
scoring_system epss
scoring_elements 0.43862
published_at 2026-04-21T12:55:00Z
1
value 0.00213
scoring_system epss
scoring_elements 0.43858
published_at 2026-04-01T12:55:00Z
2
value 0.00213
scoring_system epss
scoring_elements 0.43902
published_at 2026-04-02T12:55:00Z
3
value 0.00213
scoring_system epss
scoring_elements 0.43925
published_at 2026-04-04T12:55:00Z
4
value 0.00213
scoring_system epss
scoring_elements 0.43855
published_at 2026-04-07T12:55:00Z
5
value 0.00213
scoring_system epss
scoring_elements 0.43906
published_at 2026-04-08T12:55:00Z
6
value 0.00213
scoring_system epss
scoring_elements 0.43908
published_at 2026-04-09T12:55:00Z
7
value 0.00213
scoring_system epss
scoring_elements 0.43926
published_at 2026-04-11T12:55:00Z
8
value 0.00213
scoring_system epss
scoring_elements 0.43893
published_at 2026-04-12T12:55:00Z
9
value 0.00213
scoring_system epss
scoring_elements 0.43877
published_at 2026-04-13T12:55:00Z
10
value 0.00213
scoring_system epss
scoring_elements 0.43939
published_at 2026-04-16T12:55:00Z
11
value 0.00213
scoring_system epss
scoring_elements 0.4393
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2972
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2972
6
reference_url https://lists.exim.org/lurker/message/20140722.145949.42c043f5.en.html
reference_id
reference_type
scores
url https://lists.exim.org/lurker/message/20140722.145949.42c043f5.en.html
7
reference_url https://lists.exim.org/lurker/message/20140722.152452.d6c019e8.en.html
reference_id
reference_type
scores
url https://lists.exim.org/lurker/message/20140722.152452.d6c019e8.en.html
8
reference_url http://www.ubuntu.com/usn/USN-2933-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2933-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1122552
reference_id 1122552
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1122552
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.72:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.73:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.74:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.75:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.76:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.76:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.76:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.77:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.77:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.77:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.80:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.80:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.80:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.80.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.80.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.80.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.82:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:4.82:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.82:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2972
reference_id CVE-2014-2972
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-2972
63
reference_url https://security.gentoo.org/glsa/201607-12
reference_id GLSA-201607-12
reference_type
scores
url https://security.gentoo.org/glsa/201607-12
64
reference_url https://usn.ubuntu.com/2933-1/
reference_id USN-2933-1
reference_type
scores
url https://usn.ubuntu.com/2933-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.82.1-2?distro=trixie
purl pkg:deb/debian/exim4@4.82.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.82.1-2%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2014-2972
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vykx-t8yc-tycc
59
url VCID-x7cz-svaj-rkb5
vulnerability_id VCID-x7cz-svaj-rkb5
summary
A vulnerability in Exim may allow local users to gain root
    privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000369.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000369.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000369
reference_id
reference_type
scores
0
value 0.0031
scoring_system epss
scoring_elements 0.54139
published_at 2026-04-01T12:55:00Z
1
value 0.0031
scoring_system epss
scoring_elements 0.54156
published_at 2026-04-02T12:55:00Z
2
value 0.0031
scoring_system epss
scoring_elements 0.54186
published_at 2026-04-04T12:55:00Z
3
value 0.0031
scoring_system epss
scoring_elements 0.5416
published_at 2026-04-07T12:55:00Z
4
value 0.0031
scoring_system epss
scoring_elements 0.54212
published_at 2026-04-08T12:55:00Z
5
value 0.0031
scoring_system epss
scoring_elements 0.54208
published_at 2026-04-09T12:55:00Z
6
value 0.0031
scoring_system epss
scoring_elements 0.54258
published_at 2026-04-16T12:55:00Z
7
value 0.0031
scoring_system epss
scoring_elements 0.5424
published_at 2026-04-12T12:55:00Z
8
value 0.0031
scoring_system epss
scoring_elements 0.5422
published_at 2026-04-13T12:55:00Z
9
value 0.0031
scoring_system epss
scoring_elements 0.54262
published_at 2026-04-18T12:55:00Z
10
value 0.0031
scoring_system epss
scoring_elements 0.54243
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000369
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000369
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1457748
reference_id 1457748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1457748
4
reference_url https://security.archlinux.org/ASA-201711-32
reference_id ASA-201711-32
reference_type
scores
url https://security.archlinux.org/ASA-201711-32
5
reference_url https://security.archlinux.org/AVG-518
reference_id AVG-518
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-518
6
reference_url https://security.gentoo.org/glsa/201709-19
reference_id GLSA-201709-19
reference_type
scores
url https://security.gentoo.org/glsa/201709-19
7
reference_url https://usn.ubuntu.com/3322-1/
reference_id USN-3322-1
reference_type
scores
url https://usn.ubuntu.com/3322-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.89-3?distro=trixie
purl pkg:deb/debian/exim4@4.89-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.89-3%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2017-1000369
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x7cz-svaj-rkb5
60
url VCID-ynbw-8a6a-sug8
vulnerability_id VCID-ynbw-8a6a-sug8
summary
Multiple vulnerabilities were found in Exim, the worst of which
    leading to remote execution of arbitrary code with root privileges.
references
0
reference_url ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.70
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.70
1
reference_url http://atmail.com/blog/2010/atmail-6204-now-available/
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://atmail.com/blog/2010/atmail-6204-now-available/
2
reference_url http://bugs.exim.org/show_bug.cgi?id=787
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://bugs.exim.org/show_bug.cgi?id=787
3
reference_url http://git.exim.org/exim.git/commit/24c929a27415c7cfc7126c47e4cad39acf3efa6b
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://git.exim.org/exim.git/commit/24c929a27415c7cfc7126c47e4cad39acf3efa6b
4
reference_url http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://lists.exim.org/lurker/message/20101210.164935.385e04d0.en.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00003.html
6
reference_url http://openwall.com/lists/oss-security/2010/12/10/1
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://openwall.com/lists/oss-security/2010/12/10/1
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4344.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4344.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4344
reference_id
reference_type
scores
0
value 0.53064
scoring_system epss
scoring_elements 0.97966
published_at 2026-04-21T12:55:00Z
1
value 0.61461
scoring_system epss
scoring_elements 0.98312
published_at 2026-04-01T12:55:00Z
2
value 0.61461
scoring_system epss
scoring_elements 0.98314
published_at 2026-04-02T12:55:00Z
3
value 0.61461
scoring_system epss
scoring_elements 0.98317
published_at 2026-04-04T12:55:00Z
4
value 0.61461
scoring_system epss
scoring_elements 0.98319
published_at 2026-04-07T12:55:00Z
5
value 0.61461
scoring_system epss
scoring_elements 0.98324
published_at 2026-04-08T12:55:00Z
6
value 0.61461
scoring_system epss
scoring_elements 0.98325
published_at 2026-04-09T12:55:00Z
7
value 0.61461
scoring_system epss
scoring_elements 0.98328
published_at 2026-04-13T12:55:00Z
8
value 0.61461
scoring_system epss
scoring_elements 0.98333
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4344
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4344
10
reference_url http://secunia.com/advisories/40019
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://secunia.com/advisories/40019
11
reference_url http://secunia.com/advisories/42576
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://secunia.com/advisories/42576
12
reference_url http://secunia.com/advisories/42586
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://secunia.com/advisories/42586
13
reference_url http://secunia.com/advisories/42587
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://secunia.com/advisories/42587
14
reference_url http://secunia.com/advisories/42589
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://secunia.com/advisories/42589
15
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-4344
reference_id
reference_type
scores
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-4344
16
reference_url http://www.cpanel.net/2010/12/exim-remote-memory-corruption-vulnerability-notification-cve-2010-4344.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.cpanel.net/2010/12/exim-remote-memory-corruption-vulnerability-notification-cve-2010-4344.html
17
reference_url http://www.debian.org/security/2010/dsa-2131
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.debian.org/security/2010/dsa-2131
18
reference_url http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html
19
reference_url http://www.kb.cert.org/vuls/id/682457
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.kb.cert.org/vuls/id/682457
20
reference_url http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.metasploit.com/modules/exploit/unix/smtp/exim4_string_format
21
reference_url http://www.openwall.com/lists/oss-security/2021/05/04/7
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.openwall.com/lists/oss-security/2021/05/04/7
22
reference_url http://www.osvdb.org/69685
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.osvdb.org/69685
23
reference_url http://www.redhat.com/support/errata/RHSA-2010-0970.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.redhat.com/support/errata/RHSA-2010-0970.html
24
reference_url http://www.securityfocus.com/archive/1/515172/100/0/threaded
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.securityfocus.com/archive/1/515172/100/0/threaded
25
reference_url http://www.securityfocus.com/bid/45308
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.securityfocus.com/bid/45308
26
reference_url http://www.securitytracker.com/id?1024858
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.securitytracker.com/id?1024858
27
reference_url http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.theregister.co.uk/2010/12/11/exim_code_execution_peril/
28
reference_url http://www.ubuntu.com/usn/USN-1032-1
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.ubuntu.com/usn/USN-1032-1
29
reference_url http://www.vupen.com/english/advisories/2010/3171
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.vupen.com/english/advisories/2010/3171
30
reference_url http://www.vupen.com/english/advisories/2010/3172
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.vupen.com/english/advisories/2010/3172
31
reference_url http://www.vupen.com/english/advisories/2010/3181
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.vupen.com/english/advisories/2010/3181
32
reference_url http://www.vupen.com/english/advisories/2010/3186
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.vupen.com/english/advisories/2010/3186
33
reference_url http://www.vupen.com/english/advisories/2010/3204
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.vupen.com/english/advisories/2010/3204
34
reference_url http://www.vupen.com/english/advisories/2010/3246
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.vupen.com/english/advisories/2010/3246
35
reference_url http://www.vupen.com/english/advisories/2010/3317
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url http://www.vupen.com/english/advisories/2010/3317
36
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606612
reference_id 606612
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606612
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=661756
reference_id 661756
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:23:46Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=661756
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4344
reference_id CVE-2010-4344
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2010-4344
47
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/15725.pl
reference_id CVE-2010-4344;OSVDB-69685
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/15725.pl
48
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16925.rb
reference_id CVE-2010-4345;CVE-2010-4344;OSVDB-69685
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16925.rb
49
reference_url https://security.gentoo.org/glsa/201401-32
reference_id GLSA-201401-32
reference_type
scores
url https://security.gentoo.org/glsa/201401-32
50
reference_url https://access.redhat.com/errata/RHSA-2010:0970
reference_id RHSA-2010:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0970
51
reference_url https://usn.ubuntu.com/1032-1/
reference_id USN-1032-1
reference_type
scores
url https://usn.ubuntu.com/1032-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.70-1?distro=trixie
purl pkg:deb/debian/exim4@4.70-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.70-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2010-4344
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ynbw-8a6a-sug8
61
url VCID-yytq-tcvz-43dq
vulnerability_id VCID-yytq-tcvz-43dq
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13917.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13917.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-13917
reference_id
reference_type
scores
0
value 0.19865
scoring_system epss
scoring_elements 0.95415
published_at 2026-04-01T12:55:00Z
1
value 0.19865
scoring_system epss
scoring_elements 0.95424
published_at 2026-04-02T12:55:00Z
2
value 0.19865
scoring_system epss
scoring_elements 0.9543
published_at 2026-04-04T12:55:00Z
3
value 0.19865
scoring_system epss
scoring_elements 0.95434
published_at 2026-04-07T12:55:00Z
4
value 0.19865
scoring_system epss
scoring_elements 0.95441
published_at 2026-04-08T12:55:00Z
5
value 0.19865
scoring_system epss
scoring_elements 0.95443
published_at 2026-04-09T12:55:00Z
6
value 0.19865
scoring_system epss
scoring_elements 0.95448
published_at 2026-04-12T12:55:00Z
7
value 0.19865
scoring_system epss
scoring_elements 0.9545
published_at 2026-04-13T12:55:00Z
8
value 0.19865
scoring_system epss
scoring_elements 0.95459
published_at 2026-04-16T12:55:00Z
9
value 0.19865
scoring_system epss
scoring_elements 0.95464
published_at 2026-04-18T12:55:00Z
10
value 0.19865
scoring_system epss
scoring_elements 0.95468
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-13917
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13917
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1731412
reference_id 1731412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1731412
4
reference_url https://security.archlinux.org/ASA-201908-4
reference_id ASA-201908-4
reference_type
scores
url https://security.archlinux.org/ASA-201908-4
5
reference_url https://security.archlinux.org/AVG-1011
reference_id AVG-1011
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1011
6
reference_url https://security.gentoo.org/glsa/201909-06
reference_id GLSA-201909-06
reference_type
scores
url https://security.gentoo.org/glsa/201909-06
7
reference_url https://usn.ubuntu.com/4075-1/
reference_id USN-4075-1
reference_type
scores
url https://usn.ubuntu.com/4075-1/
fixed_packages
0
url pkg:deb/debian/exim4@4.92-10?distro=trixie
purl pkg:deb/debian/exim4@4.92-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.92-10%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2019-13917
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yytq-tcvz-43dq
62
url VCID-z51d-zdeq-suas
vulnerability_id VCID-z51d-zdeq-suas
summary
Multiple vulnerabilities have been found in Exim, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28024
reference_id
reference_type
scores
0
value 0.04033
scoring_system epss
scoring_elements 0.88446
published_at 2026-04-02T12:55:00Z
1
value 0.04033
scoring_system epss
scoring_elements 0.88462
published_at 2026-04-04T12:55:00Z
2
value 0.04033
scoring_system epss
scoring_elements 0.88438
published_at 2026-04-01T12:55:00Z
3
value 0.04361
scoring_system epss
scoring_elements 0.88952
published_at 2026-04-09T12:55:00Z
4
value 0.04361
scoring_system epss
scoring_elements 0.88964
published_at 2026-04-21T12:55:00Z
5
value 0.04361
scoring_system epss
scoring_elements 0.88958
published_at 2026-04-12T12:55:00Z
6
value 0.04361
scoring_system epss
scoring_elements 0.88957
published_at 2026-04-13T12:55:00Z
7
value 0.04361
scoring_system epss
scoring_elements 0.8897
published_at 2026-04-16T12:55:00Z
8
value 0.04361
scoring_system epss
scoring_elements 0.88968
published_at 2026-04-18T12:55:00Z
9
value 0.04361
scoring_system epss
scoring_elements 0.88929
published_at 2026-04-07T12:55:00Z
10
value 0.04361
scoring_system epss
scoring_elements 0.88947
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28024
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28008
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28009
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28012
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28013
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28014
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28015
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28017
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28019
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28021
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28022
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28023
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28024
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28025
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28026
18
reference_url https://security.archlinux.org/AVG-1911
reference_id AVG-1911
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1911
19
reference_url https://security.gentoo.org/glsa/202105-01
reference_id GLSA-202105-01
reference_type
scores
url https://security.gentoo.org/glsa/202105-01
20
reference_url https://usn.ubuntu.com/4934-1/
reference_id USN-4934-1
reference_type
scores
url https://usn.ubuntu.com/4934-1/
21
reference_url https://usn.ubuntu.com/4934-2/
reference_id USN-4934-2
reference_type
scores
url https://usn.ubuntu.com/4934-2/
fixed_packages
0
url pkg:deb/debian/exim4@4.94.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-1%3Fdistro=trixie
1
url pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/exim4@4.94.2-7%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.94.2-7%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/exim4@4.96-15%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.96-15%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/exim4@4.98.2-1?distro=trixie
purl pkg:deb/debian/exim4@4.98.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.98.2-1%3Fdistro=trixie
4
url pkg:deb/debian/exim4@4.99.1-1?distro=trixie
purl pkg:deb/debian/exim4@4.99.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie
aliases CVE-2020-28024
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z51d-zdeq-suas
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/exim4@4.99.1-1%3Fdistro=trixie