Fragen? Antworten! Siehe auch: Alternativlos
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability.