One of my first advisories and was rediscovered later, turned into a viable 
exploit 2 years after by another researcher.

http://framework.metasploit.com/exploits/view/?refname=windows:ftp:netterm_netftpd_user

http://metasploit.com:55555/EXPLOITS?MODE=SELECT&MODULE=%6e%65%74%74%65%72%6d%5f%6e%65%74%66%74%70%64%5f%75%73%65%72%5f%6f%76%65%72%66%6c%6f%77

*hugz*


----- Original Message ----- 
From: "reepex" <[EMAIL PROTECTED]>
To: "Morning Wood" <[EMAIL PROTECTED]>; 
<[email protected]>
Sent: Tuesday, December 11, 2007 1:58 PM
Subject: Re: [Full-disclosure] Microsoft FTP Client Multiple Bufferoverflow 
Vulnerability


> are you serious?
>
> http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2003-07/0259.html
>
> I guess you are a 'brain dead india wannabe sec researcher' also?
>
>
> On Dec 11, 2007 6:22 AM, Morning Wood <[EMAIL PROTECTED]> wrote:
>
>> advisories like this are typical of brain dead India wannabe sec
>> researchers
>> nuff said
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
> 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to