capabilities
- ...
I hope these new changes can be useful to you and I would appreciate any
kind of feedback, bugs, etc.
Thanks!
Jose
--
Jose Miguel Esparza
@EternalTodo
http://eternal-todo.com
___
Full-Disclosure - We believe in it.
Charter: http
! ;)
Regards,
Jose
--
Jose Miguel Esparza
http://eternal-todo.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Robert S'wie;cki escribió:
On Fri, Aug 6, 2010 at 10:14 AM, Jose Miguel Esparza
josemiguel.espa...@gmail.com wrote:
Hi!
I took a look at the PDF some days ago, looking for the PDF vuln, you
can see my post  about it here:
http://eternal-todo.com/blog/jailbreakme-pdf-exploit
Anyway
Hi,
I've not seen published the proof of concept of this vuln affecting
Foxit Reader, so I attach it. This is a calc.exe shellcode, tested in
Windows XP and Windows Vista.
Cheers!
--
Jose Miguel Esparza
http://eternal-todo.com
import sys,zlib
def getFFShellcode(sc):
ff_sc
Hi!
I took a look at the PDF some days ago, looking for the PDF vuln, you
can see my post about it here:
http://eternal-todo.com/blog/jailbreakme-pdf-exploit
Anyway, I continue analysing it...
Cheers!
Jose Miguel Esparza
http://eternal-todo.com
El 05/08/10 11:13, Ryan Sears escribió
Maybe, maybe not..
I'll update my post, because the day I published it there was no clues
about this vuln...
Thanks!
--
Jose Miguel Esparza
http://eternal-todo.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full
Hi!
If you really want to go further you can read the Adobe PDF
documentation, I think you can find almost everything about it:
http://www.adobe.com/devnet/pdf/pdf_reference_archive.html
Cheers!
El 31/05/10 13:55, rajendra prasad escribió:
Hi List,
I am trying to understand the latest pdf