A trip down memory lane: old exploits on new systems

This blog post shows how a vulnerability can be exploited by just reading the disclosure information. In other words, from disclosure to pwnage!