Home page logo
/

metasploit logo Metasploit mailing list archives

GPSD server Format String Exploit
From: senotier at enseirb.fr (SENOTIER Yann)
Date: Sun, 07 Jan 2007 17:52:37 +0100

Hello,
Sorry to repost this message but I didn't receive answers.
I have coded a module for Berlios GPSD Format String Vulnerability. It  
is coded in the Perl language for the stable version of metasploit.  
Are you still developing this version of Metasploit or are you just  
working on the version 3.0? I can transcript it in ruby so let me know  
what is the best solution.
Thank you very much

ian

----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.




  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]