BugTraq
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
CVE-2017-9046 Pegasus "winpm-32.exe" v4.72 Mailto: Link Remote Code Execution May 22 2017 02:30AM
apparitionsec gmail com (hyp3rlinx)
[+] Credits: John Page AKA hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source: http://hyp3rlinx.altervista.org/advisories/PEGASUS-MAILTO-LINK-REMOTE-CO
DE-EXECUTION.txt
[+] ISR: APPARITIONSEC

Vendor:
=============
www.pmail.com

Product:
===========================
Pegasus...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus