CVE-2005-4444
- EPSS 6.29%
- Veröffentlicht 21.12.2005 02:03:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Stack-based buffer overflow in the trace message functionality in Pegasus Mail 4.21a through 4.21c and 4.30PB1 allow remote attackers to execute arbitrary code via a long POP3 reply.
CVE-2005-4445
- EPSS 4.82%
- Veröffentlicht 21.12.2005 02:03:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Off-by-one error in Pegasus Mail 4.21a through 4.21c and 4.30PB1 allows remote attackers to execute arbitrary code via a long email message header, which triggers a one-byte buffer overflow.
CVE-2002-1075
- EPSS 11.42%
- Veröffentlicht 04.10.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Buffer overflow in Pegasus mail client 4.01 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) To or (2) From headers.
- EPSS 5.1%
- Veröffentlicht 19.12.2000 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Pegasus Mail 3.12 allows remote attackers to read arbitrary files via an embedded URL that calls the mailto: protocol with a -F switch.
CVE-2000-0931
- EPSS 1.23%
- Veröffentlicht 19.12.2000 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Buffer overflow in Pegasus Mail 3.11 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long email message containing binary data.
CVE-1999-1366
- EPSS 0.06%
- Veröffentlicht 15.05.1999 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Pegasus e-mail client 3.0 and earlier uses weak encryption to store POP3 passwords in the pmail.ini file, which allows local users to easily decrypt the passwords and read e-mail.