{"id":"CVE-2002-1381","details":"Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.","modified":"2026-01-27T04:04:52.869007Z","published":"2002-12-23T05:00:00Z","withdrawn":"2026-01-27T04:04:52.869007Z","references":[{"type":"FIX","url":"http://groups.yahoo.com/group/exim-users/message/42358"},{"type":"WEB","url":"http://marc.info/?l=bugtraq&m=103903403527788&w=2"},{"type":"WEB","url":"http://marc.info/?l=bugtraq&m=104006219018664&w=2"},{"type":"WEB","url":"http://www.exim.org/pipermail/exim-users/Week-of-Mon-20021202/046978.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/6314"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10761"}],"schema_version":"1.7.3"}