CVE-1999-0759

HIGH (10.0) No Patch (9592 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 2.78% chance of exploitation (percentile: 86%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

Buffer overflow in FuseMAIL POP service via long USER and PASS commands.

Am I affected?

You're affected if you use Buffer overflow. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

How to fix

No public patch link found in the advisory. Contact the vendor directly for remediation guidance. As immediate mitigation: restrict network access to affected systems if possible.