<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution]]></title><description><![CDATA[<p>New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://thehackernews.com/2026/05/new-exim-bdat-vulnerability-exposes.html" title="New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution">
<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrSn3emm_NbwXDi3elR0wo5ErHhg-gPT4-u4zk7MHZg4u0ruMmj2_KGgPF8fz06Riv6Gu5NXMN3eBP8H5bVf6dmvOz-lvb-qrvhLlssLUzl97ZVmIWoIOmMPOGrupv864dt0d4V_dxgaaxYYNuy2z9rbZMWIOcjlwZaiifq4-ktRqlEBCJ6a_m3MFiwq65/s1600/exim.jpg" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://thehackernews.com/2026/05/new-exim-bdat-vulnerability-exposes.html">
New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution
</a>
</h5>
<p class="card-text line-clamp-3">Exim BDAT flaw affects 4.97–4.99.2 GnuTLS builds, causing heap corruption and possible code execution.</p>
</div>
<a href="https://thehackernews.com/2026/05/new-exim-bdat-vulnerability-exposes.html" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQQyjwPYjJP0wddSEB8Dlpr3dlnQUs52-WmlrZfqJoBPeOvv2Zoqlq-FhEAz_Xeprj_mtrI1MGCW1JS840JUjVEK6VoNe6zCNNTw_7YmyvNmf3E5pprZ3zqP8lszq74Wt97SvbJo5yeuyep0U6-nGs0vdarg4_WUrc5r6L0ML0xE-BsPipJd2-1PMHTvO1/s32-e365/thn.jpg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />

















<p class="d-inline-block text-truncate mb-0">The Hacker News <span class="text-secondary">(thehackernews.com)</span></p>
</a>
</div></p><p>Read on HackerWorkspace: <a href="https://hackerworkspace.com/article/new-exim-bdat-vulnerability-exposes-gnutls-builds-to-potential-code-execution" rel="nofollow noopener"><span>https://</span><span>hackerworkspace.com/article/ne</span><span>w-exim-bdat-vulnerability-exposes-gnutls-builds-to-potential-code-execution</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" rel="tag">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/vulnerability" rel="tag">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/exploit" rel="tag">#<span>exploit</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/6dedfc46-baeb-43aa-b29f-c8acff4b27de/new-exim-bdat-vulnerability-exposes-gnutls-builds-to-potential-code-execution</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:07:53 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/6dedfc46-baeb-43aa-b29f-c8acff4b27de.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 12 May 2026 19:25:44 GMT</pubDate><ttl>60</ttl></channel></rss>