Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Sounds like an FTP server to me.


An FTP server that also then does some processing on the received file. It’s the processing that opens the machine up to exploit, not the receiving of the data.


If one piece of FTP software were both a client and server and allowed anonymous write access, yes, FTP would be fine.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: