Originally posted by ndex
View Post
I agree completely. I'm looking forward to hearing the details, because the release doesn't seem to quite add up. I was just throwing out an example of how a remote exploit doesn't necessarily have to include custom code on the victim machine being executed.
Leave a comment: