Metasploit mailing list archives
Adobe Reader Javascript Printf Buffer Overflow [ZeroDay] Exploit
From: metafan at intern0t.net (MaXe)
Date: Thu, 06 Nov 2008 08:41:11 +0100
No it's just Jerome telling us where we can grab a Proof of Concept for the Adobe thingy :) Look at the text saying "grab it here..." and then below ;) webDEViL wrote:
Is this some kinda of a bot which redirects stuff from the FD to this list? On Thu, Nov 6, 2008 at 5:38 AM, Jerome Athias <jerome.athias at free.fr <mailto:jerome.athias at free.fr>> wrote: "Since past few weeks I was busy forking adobe stuffs, it didn't took me more than few hours to come up with this exploit. Thanks to coresecurity folks for their technical details which made my job easy." -d Grab it here... http://hackingspirits.com/vuln-rnd/vuln-rnd.html <http://hackingspirits.com/vuln-rnd/vuln-rnd.html> _______________________________________________ http://spool.metasploit.com/mailman/listinfo/framework ------------------------------------------------------------------------ _______________________________________________ http://spool.metasploit.com/mailman/listinfo/framework
Current thread:
- Adobe Reader Javascript Printf Buffer Overflow [ZeroDay] Exploit Jerome Athias (Nov 05)
- Adobe Reader Javascript Printf Buffer Overflow [ZeroDay] Exploit webDEViL (Nov 05)
- Adobe Reader Javascript Printf Buffer Overflow [ZeroDay] Exploit MaXe (Nov 05)
- Adobe Reader Javascript Printf Buffer Overflow [ZeroDay] Exploit webDEViL (Nov 05)