Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2001-0690

Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.199
EPSS Ranking 95.1%
CVSS Severity
CVSS v2 Score 7.5
Products affected by CVE-2001-0690
  • University Of Cambridge » Exim » Version: Any
    cpe:2.3:a:university_of_cambridge:exim:*
  • Conectiva » Linux » Version: N/A
    cpe:2.3:o:conectiva:linux:-
  • Conectiva » Linux » Version: 1.0.0
    cpe:2.3:o:conectiva:linux:1.0.0
  • Conectiva » Linux » Version: 10
    cpe:2.3:o:conectiva:linux:10
  • Conectiva » Linux » Version: 10.0
    cpe:2.3:o:conectiva:linux:10.0
  • Conectiva » Linux » Version: 4.0
    cpe:2.3:o:conectiva:linux:4.0
  • Conectiva » Linux » Version: 4.0es
    cpe:2.3:o:conectiva:linux:4.0es
  • Conectiva » Linux » Version: 4.1
    cpe:2.3:o:conectiva:linux:4.1
  • Conectiva » Linux » Version: 4.2
    cpe:2.3:o:conectiva:linux:4.2
  • Conectiva » Linux » Version: 5.0
    cpe:2.3:o:conectiva:linux:5.0
  • Conectiva » Linux » Version: 5.1
    cpe:2.3:o:conectiva:linux:5.1
  • Conectiva » Linux » Version: 6.0
    cpe:2.3:o:conectiva:linux:6.0
  • Conectiva » Linux » Version: 7.0
    cpe:2.3:o:conectiva:linux:7.0
  • Conectiva » Linux » Version: 8.0
    cpe:2.3:o:conectiva:linux:8.0
  • Conectiva » Linux » Version: 9.0
    cpe:2.3:o:conectiva:linux:9.0
  • Conectiva » Linux » Version: ecommerce
    cpe:2.3:o:conectiva:linux:ecommerce
  • Conectiva » Linux » Version: graficas
    cpe:2.3:o:conectiva:linux:graficas
  • Conectiva » Linux » Version: prg_graficos
    cpe:2.3:o:conectiva:linux:prg_graficos
  • Debian » Debian Linux » Version: 4.0
    cpe:2.3:o:debian:debian_linux:4.0
  • Redhat » Linux » Version: N/A
    cpe:2.3:o:redhat:linux:-
  • Redhat » Linux » Version: 1.0
    cpe:2.3:o:redhat:linux:1.0
  • Redhat » Linux » Version: 1.1
    cpe:2.3:o:redhat:linux:1.1
  • Redhat » Linux » Version: 2.0
    cpe:2.3:o:redhat:linux:2.0
  • Redhat » Linux » Version: 2.0.34
    cpe:2.3:o:redhat:linux:2.0.34
  • Redhat » Linux » Version: 2.1
    cpe:2.3:o:redhat:linux:2.1
  • Redhat » Linux » Version: 2.4.2
    cpe:2.3:o:redhat:linux:2.4.2
  • Redhat » Linux » Version: 2.6.2
    cpe:2.3:o:redhat:linux:2.6.2
  • Redhat » Linux » Version: 3.0
    cpe:2.3:o:redhat:linux:3.0
  • Redhat » Linux » Version: 3.0.3
    cpe:2.3:o:redhat:linux:3.0.3
  • Redhat » Linux » Version: 4.0
    cpe:2.3:o:redhat:linux:4.0
  • Redhat » Linux » Version: 4.1
    cpe:2.3:o:redhat:linux:4.1
  • Redhat » Linux » Version: 4.2
    cpe:2.3:o:redhat:linux:4.2
  • Redhat » Linux » Version: 5.0
    cpe:2.3:o:redhat:linux:5.0
  • Redhat » Linux » Version: 5.1
    cpe:2.3:o:redhat:linux:5.1
  • Redhat » Linux » Version: 5.2
    cpe:2.3:o:redhat:linux:5.2
  • Redhat » Linux » Version: 6.0
    cpe:2.3:o:redhat:linux:6.0
  • Redhat » Linux » Version: 6.1
    cpe:2.3:o:redhat:linux:6.1
  • Redhat » Linux » Version: 6.2
    cpe:2.3:o:redhat:linux:6.2
  • Redhat » Linux » Version: 6.2e
    cpe:2.3:o:redhat:linux:6.2e
  • Redhat » Linux » Version: 7
    cpe:2.3:o:redhat:linux:7
  • Redhat » Linux » Version: 7.0
    cpe:2.3:o:redhat:linux:7.0
  • Redhat » Linux » Version: 7.1
    cpe:2.3:o:redhat:linux:7.1
  • Redhat » Linux » Version: 7.2
    cpe:2.3:o:redhat:linux:7.2
  • Redhat » Linux » Version: 7.3
    cpe:2.3:o:redhat:linux:7.3
  • Redhat » Linux » Version: 8.0
    cpe:2.3:o:redhat:linux:8.0
  • Redhat » Linux » Version: 9
    cpe:2.3:o:redhat:linux:9
  • Redhat » Linux » Version: 9.0
    cpe:2.3:o:redhat:linux:9.0


Contact Us

Shodan ® - All rights reserved