Description: http://4xunderground.blogspot.com/2011/04/cve-2011-0611-adobe-flash-player.html
Hackers are embedding malicious Flash Player files in Microsoft Word documents to launch targeted attacks against select businesses, according to a warning from Adobe.
This latest Flash Player zero-day attack comes just weeks after EMC’s RSA Division was hit with a malware attack that used a rigged Flash (.swf) file embedded in a Microsoft Excel document.
Tags: adobe , flash , vulnerability , 0 day ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
How do I fix this? :
[*] Exploit running as background job.
[-] Handler failed to bind to 192.168.159.129:4444
[*] Started revers handler on 0.0.0.0:4444
[-] Exploit excpetion: The address is already in use (192.169.159.129:8080).
Please, help me!
Thanks.
is any thing running on 192.168.159.129:4444 ? if so kill it, if you can't find it try using a diffrent port.