296,663
Total vulnerabilities in the database
Multiple buffer overflows in filter command in Elm 2.4 allows attackers to execute arbitrary commands via (1) long From: headers, (2) long Reply-To: headers, or (3) via a long -f (filterfile) command line argument.
Software | From | Fixed in |
---|---|---|
elm_development_group / elm | 2.4 | 2.4.x |