14 Followers
0 Following
133 Posts

ZEN #SecDB Portal provides an easy to use web interface to #CVE vulnerability data. You can browse for vendors, products and versions and view CVE entries, vulnerabilities, related to them. You can view statistics about vendors, products and versions of products.

ZEN SecDB Portal: https://secdb.nttzen.cloud

SecDB Telegram Channel: https://t.me/secdbportal_feed
SecDB Telegram Bot: https://t.me/secdbportal_bot

Websitehttps://secdb.nttzen.cloud
Advisorieshttps://secdb.nttzen.cloud/security-advisory
Vulnerabilitieshttps://secdb.nttzen.cloud/cve
Sightigshttps://secdb.nttzen.cloud/sightings
Dashboardhttps://secdb.nttzen.cloud/dashboard
Abouthttps://secdb.nttzen.cloud/about

🚨 CVE-2026-45185 (Dead.Letter)

Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitrary code.

ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-45185

#nttdata #zen #secdb #infosec
#deadletter #cve202645185 #exim #gnutls