Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r9hx-hmhj-28pf

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.3

Описание

winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code execution via a crafted ssgp.dll file that must be installed locally. For example, if ssgp.dll is on the desktop and executes arbitrary code in the DllMain function, then clicking on a mailto: link on a remote web page triggers the attack.

winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code execution via a crafted ssgp.dll file that must be installed locally. For example, if ssgp.dll is on the desktop and executes arbitrary code in the DllMain function, then clicking on a mailto: link on a remote web page triggers the attack.

EPSS

Процентиль: 30%
0.00113
Низкий

7.3 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.3
nvd
больше 8 лет назад

winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code execution via a crafted ssgp.dll file that must be installed locally. For example, if ssgp.dll is on the desktop and executes arbitrary code in the DllMain function, then clicking on a mailto: link on a remote web page triggers the attack.

EPSS

Процентиль: 30%
0.00113
Низкий

7.3 High

CVSS3

Дефекты

CWE-20