CVE-2017-9046
21.05.2017, 14:29
winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code execution via a crafted ssgp.dll file that must be installed locally. For example, if ssgp.dll is on the desktop and executes arbitrary code in the DllMain function, then clicking on a mailto: link on a remote web page triggers the attack.Enginsight
Vendor | Product | Version |
---|---|---|
pmail | pegasus | 4.72 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration