winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code execution via a crafted ssgp.dll file that must be installed locally. For example, if ssgp.dll is on the desktop and executes arbitrary code in the DllMain function, then clicking on a mailto: link on a remote web page triggers the attack.
Max CVSS
7.3
EPSS Score
0.05%
Published
2017-05-21
Updated
2017-06-02
Buffer overflow in the IMAP service of Mercury (Pegasus) Mail 4.01 allows remote attackers to execute arbitrary code via a long SELECT command.
Max CVSS
10.0
EPSS Score
4.17%
Published
2004-12-31
Updated
2017-10-19
2 vulnerabilities found