Multiple vulnerabilities have been discovered in Exim, the most severe of which could allow for remote code execution. Exim is a mail transfer agent used to deploy mail servers on Unix-like systems. Successful exploitation of the most severe of these vulnerabilities will enable the attacker to perform command execution as root in the context of the mail server. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
More Stories
mingw-poppler-24.08.0-4.fc42
FEDORA-2025-67d2e84a2b Packages in this update: mingw-poppler-24.08.0-4.fc42 Update description: Backport fixes for CVE-2025-32364 and CVE-2025-32365. Read More
mingw-poppler-24.02.0-5.fc40
FEDORA-2025-bce8e14ac6 Packages in this update: mingw-poppler-24.02.0-5.fc40 Update description: Backport fixes for CVE-2025-32364 and CVE-2025-32365. Read More
mingw-poppler-24.02.0-5.fc41
FEDORA-2025-5e9faa5173 Packages in this update: mingw-poppler-24.02.0-5.fc41 Update description: Backport fixes for CVE-2025-32364 and CVE-2025-32365. Read More
USN-7439-1: QuickJS vulnerabilities
It was discovered that QuickJS could be forced to reference uninitialized memory in certain instances. An attacker could possibly use...
USN-7438-1: 7-Zip vulnerabilities
Igor Pavlov discovered that 7-Zip had several memory-related issues. An attacker could possibly use these issues to cause 7-Zip to...
mingw-libsoup-2.74.3-10.fc41
FEDORA-2025-8d023de6cb Packages in this update: mingw-libsoup-2.74.3-10.fc41 Update description: Backport fixes for CVE-2025-32050 CVE-2025-32052 CVE-2025-32053 CVE-2025-32906 CVE-2025-32907 CVE-2025-32909 Read More