Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vpwx-p4f8-3qwq

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.

Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.

EPSS

Процентиль: 98%
0.51974
Средний

Связанные уязвимости

nvd
около 19 лет назад

Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.

EPSS

Процентиль: 98%
0.51974
Средний