The Dovecot documentation contains an example using a dangerous configuration option for Exim, which leads to a remote command execution vulnerability. Exploit Platform Linux Exploit Type Exploits Remote Product Name Impact