Metasploit mailing list archives

GPSD server Format String Exploit


From: senotier at enseirb.fr (Yann Senotier)
Date: Mon, 1 Jan 2007 22:31:20 +0100

Hello,
I have coded a module for Berlios GPSD Format String Vulnerability. It is coded in the Perl language for the stable 
version of metasploit. Are you still developing this version of Metasploit or are you just working on the version 3.0? 
I can transcript it in ruby so let me know what is the best solution.
Thank you
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070101/9d80f4e7/attachment.htm>


Current thread: