Metasploit mailing list archives

module for Wzdftpd SITE Command Arbitrary Command Execution


From: david.maciejak at kyxar.fr (David Maciejak)
Date: Fri, 4 Nov 2005 08:52:07 +0100

Hi,

some time ago I had done a module for Wzdftpd SITE Command Arbitrary Command
Execution flaw (bid:14935). It s an execution exploit not an overflow exploit,
but works pretty well.


Cheers,

David Maciejak


--------------------------------------------------------------------------------
KYXAR.FR - Mail envoy? depuis http://webmail.kyxar.fr
-------------- next part --------------
A non-text attachment was scrubbed...
Name: wzdftpd_site.pm
Type: application/octet-stream
Size: 3269 bytes
Desc: not available
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20051104/dabf7741/attachment.obj>


Current thread: