### [CVE-2019-15846](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15846) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash. ### POC #### Reference - http://exim.org/static/doc/security/CVE-2019-15846.txt - http://exim.org/static/doc/security/CVE-2019-15846.txt - https://exim.org/static/doc/security/CVE-2019-15846.txt - https://exim.org/static/doc/security/CVE-2019-15846.txt - https://www.kb.cert.org/vuls/id/672565 - https://www.kb.cert.org/vuls/id/672565 #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon - https://github.com/alphaSeclab/sec-daily-2019 - https://github.com/area1/exim-cve-2019-10149-data - https://github.com/cloudflare/exim-cve-2019-10149-data - https://github.com/d3k4z/nmap-cve2019-15846 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/iGotRootSRC/Dorkers - https://github.com/synacktiv/Exim-CVE-2019-15846