Exim before 4.87.1 might allow remote attackers to obtain the private DKIM signing key via vectors related to log files and bounce messages.
CPE | Name | Operator | Version |
---|---|---|---|
exim | eq | exim-4_69 | |
exim | eq | exim-4_73 | |
exim | eq | exim-4_76 | |
exim | eq | list_safety_merge_proposal | |
exim | eq | exim-4_83_RC3 | |
exim | eq | exim-4_80_RC4 | |
exim | eq | exim-4_51 | |
exim | eq | exim-4_85_RC4 | |
exim | eq | exim-4_72_RC1 | |
exim | eq | exim-4_86_RC5 |