Total vulnerabilities in the database
Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.
Software | From | Fixed in |
---|---|---|
exim / exim | - | 4.87.x |
canonical / ubuntu_linux | 16.10 | 16.10.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
debian / debian_linux | 8.0 | 8.0.x |