Vulnerable Systems:
* Smartphone Pentest Framework 0.1.3 and 0.1.4
Remote attackers can exploit these issues to execute arbitrary commands within the context of the vulnerable application to gain root access. This may facilitate a complete compromise of an affected computer.
The following data is available:
http://downloads.securityfocus.com/vulnerabilities/exploits/56881.html.txt