Search for vulnerabilities
Vulnerability details: VCID-ad99-nt98-aaah
Vulnerability ID VCID-ad99-nt98-aaah
Aliases CVE-2011-0017
Summary The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00096 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2011-0017
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=670945
cvssv2 6.9 https://nvd.nist.gov/vuln/detail/CVE-2011-0017
Reference id Reference type URL
ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74
http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
http://osvdb.org/70696
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0017.json
https://api.first.org/data/v1/epss?cve=CVE-2011-0017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0017
http://secunia.com/advisories/43101
http://secunia.com/advisories/43128
http://secunia.com/advisories/43243
https://exchange.xforce.ibmcloud.com/vulnerabilities/65028
http://www.debian.org/security/2011/dsa-2154
http://www.securityfocus.com/bid/46065
http://www.ubuntu.com/usn/USN-1060-1
http://www.vupen.com/english/advisories/2011/0224
http://www.vupen.com/english/advisories/2011/0245
http://www.vupen.com/english/advisories/2011/0364
http://www.vupen.com/english/advisories/2011/0464
670945 https://bugzilla.redhat.com/show_bug.cgi?id=670945
cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:2.10:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:2.11:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:2.12:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.00:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.01:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.02:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.03:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.10:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.11:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.12:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.13:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.14:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.15:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.16:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.20:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.21:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.22:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.30:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.31:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.32:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.33:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.34:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.35:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:3.36:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.00:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.01:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.02:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.03:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.04:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.05:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.10:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.11:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.12:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.14:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.20:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.21:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.22:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.23:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.24:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.30:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.31:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.32:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.33:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.34:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.40:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.41:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.42:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.43:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.44:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.50:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.51:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.52:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.53:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.54:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.60:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.61:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.62:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.63:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.64:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.65:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.66:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.67:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.68:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.69:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.70:*:*:*:*:*:*:*
cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:exim:exim:4.71:*:*:*:*:*:*:*
CVE-2011-0017 https://nvd.nist.gov/vuln/detail/CVE-2011-0017
GLSA-201401-32 https://security.gentoo.org/glsa/201401-32
USN-1060-1 https://usn.ubuntu.com/1060-1/
No exploits are available.
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2011-0017
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.10982
EPSS Score 0.00044
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.