Total vulnerabilities in the database
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
Software | From | Fixed in |
---|---|---|
exim / exim | 4.00 | 4.94.2 |