๐Ÿ” CVE Alert

CVE-2010-20119

UNKNOWN 0.0

CommuniCrypt Mail <= 1.16 ANSMTP/AOSMTP ActiveX Control Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

CommuniCrypt Mail versions up to and including 1.16 contains a stack-based buffer overflow vulnerability in its ANSMTP.dll and AOSMTP.dll ActiveX controls, specifically within the AddAttachments() method. This method fails to properly validate the length of input strings, allowing data to exceed the bounds of a fixed-size stack buffer. When invoked with an overly long string, the control can corrupt adjacent memory structures, including exception handlers, leading to potential control flow disruption.

CWE CWE-121
Vendor communicrypt software
Product communicrypt mail
Published Aug 21, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for communicrypt software communicrypt mail

Be the first to know when new unknown vulnerabilities affecting communicrypt software communicrypt mail are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

CommuniCrypt Software / CommuniCrypt Mail
* โ‰ค 1.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/browser/communicrypt_mail_activex.rb exploit-db.com: https://www.exploit-db.com/exploits/12663 broadcom.com: https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=24374 softwarelode.com: https://softwarelode.com/4185/details-communicrypt-mail.html fortiguard.com: https://www.fortiguard.com/encyclopedia/ips/23099 vulncheck.com: https://www.vulncheck.com/advisories/communicrypt-mail-activex-control-buffer-overflow

Credits

Lincoln