Metasploit mailing list archives
module for Wzdftpd SITE Command Arbitrary Command Execution
From: david.maciejak at kyxar.fr (David Maciejak)
Date: Fri, 4 Nov 2005 08:52:07 +0100
Hi, some time ago I had done a module for Wzdftpd SITE Command Arbitrary Command Execution flaw (bid:14935). It s an execution exploit not an overflow exploit, but works pretty well. Cheers, David Maciejak -------------------------------------------------------------------------------- KYXAR.FR - Mail envoy? depuis http://webmail.kyxar.fr -------------- next part -------------- A non-text attachment was scrubbed... Name: wzdftpd_site.pm Type: application/octet-stream Size: 3269 bytes Desc: not available URL: <http://mail.metasploit.com/pipermail/framework/attachments/20051104/dabf7741/attachment.obj>
Current thread:
- module for Wzdftpd SITE Command Arbitrary Command Execution David Maciejak (Nov 03)