4 results (0.005 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

Buffer overflow in Pegasus mail client 4.01 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) To or (2) From headers. • https://www.exploit-db.com/exploits/21648 http://archives.neohapsis.com/archives/bugtraq/2002-07/0277.html http://www.iss.net/security_center/static/9673.php http://www.securityfocus.com/bid/5302 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 2

Pegasus Mail 3.12 allows remote attackers to read arbitrary files via an embedded URL that calls the mailto: protocol with a -F switch. • https://www.exploit-db.com/exploits/20249 http://archives.neohapsis.com/archives/bugtraq/2000-10/0039.html http://archives.neohapsis.com/archives/bugtraq/2000-10/0436.html http://www.securityfocus.com/bid/1738 https://exchange.xforce.ibmcloud.com/vulnerabilities/5326 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in Pegasus Mail 3.11 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long email message containing binary data. • http://www.securityfocus.com/archive/1/137518 http://www.securityfocus.com/bid/1750 •

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 0

Pegasus e-mail client 3.0 and earlier uses weak encryption to store POP3 passwords in the pmail.ini file, which allows local users to easily decrypt the passwords and read e-mail. • http://marc.info/?l=bugtraq&m=92714118829880&w=2 •