5 lines
No EOL
332 B
Text
Executable file
5 lines
No EOL
332 B
Text
Executable file
source: http://www.securityfocus.com/bid/9974/info
|
|
|
|
Multiple locally and remotely exploitable buffer overrun and format strings were reported in emil. This could permit execution of arbitrary code in the context of the software.
|
|
|
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/23881.tar.gz |