296,733
Total vulnerabilities in the database
Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.
| Software | From | Fixed in |
|---|---|---|
| exim / exim | - | 4.87.x |
| canonical / ubuntu_linux | 16.10 | 16.10.x |
| canonical / ubuntu_linux | 12.04 | 12.04.x |
| canonical / ubuntu_linux | 16.04 | 16.04.x |
| canonical / ubuntu_linux | 14.04 | 14.04.x |
| debian / debian_linux | 8.0 | 8.0.x |