source: https://www.securityfocus.com/bid/22583/info EasyMail Objects is prone to a remote stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data prior to copying it to an insufficiently sized buffer. An attacker can leverage this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Versions prior to EasyMail Objects 6.5 are vulnerable. Spam Inspector 4.0.354 is vulnerable. Quiksoft EasyMail 6.0.3.0 imap connect() stack overflow Failed to instantiate object.