I was reading this:
today and I am confused on one thing. Am I right in believing that any memory corruption vulnerability (with adequate memory to inject code) can be considered a remote exploit? Am I only asking because in this advisory by zdi it seems to show a file being locally executed.
Sponsored by: █ Sparkhost - Hosting Without Compromises! █ Hybrid Performance Web Hosting █ Spark Host Stream Hosting █ Hybrid IRC & IRCd Server Shell Accounts
Question About Remote Exploits
No replies to this topic
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users