commit
bcc76e31d4
|
@ -27,6 +27,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '77455'],
|
||||
['URL', 'http://www.exploit-db.com/exploits/18189/'],
|
||||
['URL', 'http://secpod.org/advisories/SecPod_Ipswitch_TFTP_Server_Dir_Trav.txt']
|
||||
],
|
||||
|
@ -88,4 +89,4 @@ end
|
|||
=begin
|
||||
Remote code execution might be unlikely with this directory traversal bug, because WRITE
|
||||
requests are forbidden by default, and cannot be changed.
|
||||
=end
|
||||
=end
|
||||
|
|
Loading…
Reference in New Issue