Hi !! it’s amazing !! Just i want to notice that the proof link is inactive !! so I have reaserched it at Exploit-db.com, I found it on this link : http://www.exploit-db.com/exploits/15532/
Hello, thank you for the excellent article, but i would like to re produce the steps you followed, but i cannot find the vulnerable pdf to start with…any hint where i can find it?