2 results (0.005 seconds)

CVSS: 5.1EPSS: 8%CPEs: 4EXPL: 0

Stack-based buffer overflow in the trace message functionality in Pegasus Mail 4.21a through 4.21c and 4.30PB1 allow remote attackers to execute arbitrary code via a long POP3 reply. • http://secunia.com/advisories/17992 http://secunia.com/secunia_research/2005-61/advisory http://securitytracker.com/id?1015385 http://www.osvdb.org/21842 http://www.pmail.com/newsflash.htm#secunia http://www.securityfocus.com/archive/1/419908/100/0/threaded http://www.securityfocus.com/bid/15973 http://www.vupen.com/english/advisories/2005/3004 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.1EPSS: 9%CPEs: 4EXPL: 0

Off-by-one error in Pegasus Mail 4.21a through 4.21c and 4.30PB1 allows remote attackers to execute arbitrary code via a long email message header, which triggers a one-byte buffer overflow. • http://secunia.com/advisories/17992 http://secunia.com/secunia_research/2005-61/advisory http://securitytracker.com/id?1015385 http://www.osvdb.org/21843 http://www.pmail.com/newsflash.htm#secunia http://www.securityfocus.com/archive/1/419908/100/0/threaded http://www.securityfocus.com/bid/15973 •