Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

exim

About This Vendor

exim is a technology vendor producing software and infrastructure products. As a software provider, exim's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of exim's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 59 known vulnerabilities from exim. This includes 17 critical-severity issues and 26 high-severity issues that represent significant risk. These vulnerabilities affect 7 distinct products across exim's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2010 through 2025, indicating decades of continuous security attention and research. Organizations deploying exim products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2010-2023 2010-06-07 2025-04-11 - 4.4 Unknown
CVE-2010-2024 2010-06-07 2025-04-11 - 4.4 Unknown
CVE-2010-4344 2010-12-14 2025-10-22 9.8 9.3 Likely
CVE-2010-4345 2010-12-14 2025-10-22 7.8 6.9 Unknown
CVE-2011-0017 2011-02-02 2025-04-11 - 6.9 Unknown
CVE-2011-1407 2011-05-16 2025-04-11 - 7.5 Likely
CVE-2011-1764 2011-10-05 2025-04-11 - 7.5 Likely
CVE-2012-5671 2012-10-31 2025-04-11 - 6.8 Likely
CVE-2014-2957 2014-09-04 2025-04-12 - 6.8 Likely
CVE-2014-2972 2014-09-04 2025-04-12 - 4.6 Unknown
CVE-2016-1531 2016-04-07 2025-04-12 7.0 6.9 Unknown
CVE-2016-9963 2017-02-01 2025-04-20 5.9 2.6 Unknown
CVE-2017-1000369 2017-06-19 2025-04-20 4.0 2.1 Unknown
CVE-2017-16943 2017-11-25 2025-04-20 9.8 7.5 Likely
CVE-2017-16944 2017-11-25 2025-04-20 7.5 5.0 Likely
CVE-2018-6789 2018-02-08 2025-11-07 9.8 7.5 Likely
CVE-2019-10149 2019-06-05 2025-11-06 9.8 10.0 Likely
CVE-2019-13917 2019-07-25 2024-11-21 9.8 10.0 Likely
CVE-2019-15846 2019-09-06 2024-11-21 9.8 10.0 Likely
CVE-2019-16928 2019-09-27 2025-11-07 9.8 7.5 Likely
CVE-2020-8015 2020-04-02 2024-11-21 8.4 7.2 Unknown
CVE-2020-12783 2020-05-11 2024-11-21 7.5 5.0 Likely
CVE-2020-28007 2021-05-06 2024-11-21 7.8 7.2 Unknown
CVE-2020-28008 2021-05-06 2024-11-21 7.8 7.2 Unknown
CVE-2020-28009 2021-05-06 2024-11-21 7.8 7.2 Unknown
CVE-2020-28010 2021-05-06 2024-11-21 7.8 7.2 Unknown
CVE-2020-28011 2021-05-06 2024-11-21 7.8 7.2 Unknown
CVE-2020-28012 2021-05-06 2024-11-21 7.8 7.2 Unknown
CVE-2020-28013 2021-05-06 2024-11-21 7.8 7.2 Unknown
CVE-2020-28014 2021-05-06 2024-11-21 6.1 5.6 Unknown
CVE-2020-28015 2021-05-06 2024-11-21 7.8 7.2 Unknown
CVE-2020-28016 2021-05-06 2024-11-21 7.8 7.2 Unknown
CVE-2020-28017 2021-05-06 2024-11-21 9.8 7.5 Likely
CVE-2020-28018 2021-05-06 2024-11-21 9.8 7.5 Likely
CVE-2020-28019 2021-05-06 2024-11-21 7.5 5.0 Likely
CVE-2020-28020 2021-05-06 2024-11-21 9.8 7.5 Likely
CVE-2020-28021 2021-05-06 2024-11-21 8.8 9.0 Likely
CVE-2020-28022 2021-05-06 2024-11-21 9.8 7.5 Likely
CVE-2020-28023 2021-05-06 2024-11-21 7.5 5.0 Likely
CVE-2020-28024 2021-05-06 2024-11-21 9.8 7.5 Likely
CVE-2020-28025 2021-05-06 2024-11-21 7.5 5.0 Likely
CVE-2020-28026 2021-05-06 2024-11-21 9.8 9.3 Likely
CVE-2021-27216 2021-05-06 2024-11-21 6.3 6.3 Unknown
CVE-2021-38371 2021-08-10 2025-11-03 7.5 5.0 Likely
CVE-2022-37451 2022-08-06 2024-11-21 7.5 - -
CVE-2022-37452 2022-08-07 2024-11-21 9.8 - -
CVE-2022-3559 2022-10-17 2025-11-03 4.6 - -
CVE-2022-3620 2022-10-20 2025-05-23 5.6 - -
CVE-2023-51766 2023-12-24 2025-11-04 5.3 - -
CVE-2023-42114 2024-05-03 2025-11-04 5.3 - -
CVE-2023-42115 2024-05-03 2025-08-07 9.8 - -
CVE-2023-42116 2024-05-03 2025-11-04 9.8 - -
CVE-2023-42117 2024-05-03 2025-11-03 9.8 - -
CVE-2023-42118 2024-05-03 2025-08-07 8.8 - -
CVE-2023-42119 2024-05-03 2025-11-03 3.1 - -
CVE-2024-39929 2024-07-04 2025-07-10 5.4 - -
CVE-2025-26794 2025-02-21 2025-12-18 7.5 - -
CVE-2025-30232 2025-03-28 2025-09-30 8.1 - -
CVE-2025-67896 2025-12-14 2025-12-22 7.0 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for exim by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with exim's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.