Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tabslab
Tabslab mailcarrier |
|
| CPEs | cpe:2.3:a:tabslab:mailcarrier:2.51:*:*:*:*:*:*:* | |
| Vendors & Products |
Tabslab
Tabslab mailcarrier |
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tabs Laboratories Corporation
Tabs Laboratories Corporation win10 Mailcarrier |
|
| Vendors & Products |
Tabs Laboratories Corporation
Tabs Laboratories Corporation win10 Mailcarrier |
Wed, 18 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MailCarrier 2.51 contains a buffer overflow vulnerability in the POP3 USER command that allows remote attackers to execute arbitrary code. Attackers can send a crafted oversized buffer to the POP3 service, overwriting memory and potentially gaining remote system access. | |
| Title | Win10 MailCarrier 2.51 - 'POP3 User' Remote Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-19T20:08:53.368Z
Reserved: 2026-02-13T17:39:25.503Z
Link: CVE-2019-25364
Updated: 2026-02-19T20:07:10.964Z
Status : Analyzed
Published: 2026-02-18T22:16:22.260
Modified: 2026-02-24T20:41:08.130
Link: CVE-2019-25364
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:10:39Z