Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-1531

EPSS 56.77% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2016-1531

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Exim Configuration File Path 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Exim是英国剑桥大学开发的一个运行于Unix系统中的开源消息传送代理(MTA),它主要负责邮件的路由、转发和投递。 Exim 4.86.2之前版本中存在安全。当程序安装了setuid root时,本地攻击者可借助‘perl_startup’参数利用该漏洞获取权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2016-1531

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/crypticdante/CVE-2016-1531POC Details
2Nonehttps://github.com/H3xL00m/CVE-2016-1531POC Details
3Nonehttps://github.com/n3ov4n1sh/CVE-2016-1531POC Details
4Nonehttps://github.com/c0d3cr4f73r/CVE-2016-1531POC Details
5Nonehttps://github.com/Sp3c73rSh4d0w/CVE-2016-1531POC Details
6Nonehttps://github.com/0xwh1pl4sh/CVE-2016-1531POC Details
7Nonehttps://github.com/N3rdyN3xus/CVE-2016-1531POC Details
8Nonehttps://github.com/NyxByt3/CVE-2016-1531POC Details
9Nonehttps://github.com/h3xcr4ck3r/CVE-2016-1531POC Details
10Nonehttps://github.com/n3rdh4x0r/CVE-2016-1531POC Details
11Nonehttps://github.com/h3x0v3rl0rd/CVE-2016-1531POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2016-1531

登录查看更多情报信息。

Same Patch Batch · n/a · 2016-04-07 · 36 CVEs total

CVE-2016-0790CloudBees Jenkins CI和LTS 安全漏洞
CVE-2016-2510BeanShell 任意命令执行漏洞
CVE-2015-2774Erlang OTP 信息泄露漏洞
CVE-2016-0729Apache Xerces XML Parser库缓冲区错误漏洞
CVE-2016-2086Joyent Node.js 安全漏洞
CVE-2016-2216Joyent Node.js HTTP响应拆分攻击
CVE-2016-2511websvn 跨站脚本漏洞
CVE-2016-0788CloudBees Jenkins CI和LTS 远程代码执行漏洞
CVE-2016-0789CloudBees Jenkins CI和LTS CLI CRLF注入漏洞
CVE-2015-8681Huawei P8和Mate S ovisp驱动程序安全漏洞
CVE-2016-0791CloudBees Jenkins CI和LTS 安全漏洞
CVE-2016-0792CloudBees Jenkins CI和LTS 任意代码执行漏洞
CVE-2016-2097Ruby on Rails Action View组件目录遍历漏洞
CVE-2016-2098Ruby on Rails Action Pack 安全漏洞
CVE-2016-2563PuTTY和KiTTY 基于栈的缓冲区溢出漏洞
CVE-2016-2789Citrix Systems XenMobile Server 跨站脚本漏洞
CVE-2016-2851libotr 整数溢出漏洞
CVE-2016-3976SAP NetWeaver AS Java 目录遍历漏洞
CVE-2016-3973SAP NetWeaver AS Java Real-Time Collaboration服务安全漏洞
CVE-2016-1019Adobe Flash Player 安全漏洞

Showing top 20 of 36 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2016-1531

No comments yet


Leave a comment