Metasploit mailing list archives
Adobe Reader Javascript Printf Buffer Overflow [ZeroDay] Exploit
From: w3bd3vil at gmail.com (webDEViL)
Date: Thu, 6 Nov 2008 07:22:06 +0530
Is this some kinda of a bot which redirects stuff from the FD to this list? On Thu, Nov 6, 2008 at 5:38 AM, Jerome Athias <jerome.athias at free.fr> wrote:
"Since past few weeks I was busy forking adobe stuffs, it didn't took me more than few hours to come up with this exploit. Thanks to coresecurity folks for their technical details which made my job easy." -d Grab it here... http://hackingspirits.com/vuln-rnd/vuln-rnd.html <http://hackingspirits.com/vuln-rnd/vuln-rnd.html> _______________________________________________ http://spool.metasploit.com/mailman/listinfo/framework
-------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20081106/06c3b137/attachment.htm>
Current thread:
- Adobe Reader Javascript Printf Buffer Overflow [ZeroDay] Exploit Jerome Athias (Nov 05)
- Adobe Reader Javascript Printf Buffer Overflow [ZeroDay] Exploit webDEViL (Nov 05)