{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Exim versions post\u00e9rieures ou \u00e9gales \u00e0 4.97 et ant\u00e9rieures \u00e0 4.99.3","product":{"name":"Exim","vendor":{"name":"Exim","scada":false}}}],"affected_systems_content":"","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2026-45185","url":"https://www.cve.org/CVERecord?id=CVE-2026-45185"}],"links":[],"reference":"CERTFR-2026-AVI-0589","revisions":[{"description":"Version initiale","revision_date":"2026-05-13T00:00:00.000000"}],"risks":[{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"}],"summary":"Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Exim. Elle permet \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l'\u00e9diteur.","title":"Vuln\u00e9rabilit\u00e9 dans Exim ","vendor_advisories":[{"published_at":"2026-05-12","title":"Bulletin de s\u00e9curit\u00e9 Exim Security-2026-05-01.1","url":"https://exim.org/static/doc/security/EXIM-Security-2026-05-01.1/EXIM-Security-2026-05-01.1.txt"}]}
