Proof of concept exploit for the Nullsoft SHOUTcast 1.9.4 File Request format string vulnerability.
f2d37d4e739ae49f7956859a9f8d89d5377574ab9943abe4818667d424cb0b7a
3CServer ftp server version 1.1 remote exploit that binds a shell to port 1180.
b5968e526f536105d0b7f4dd141a4dd4e87ff1181b770a5035d8b3578d83f457
Local proof of concept exploit for AIM 5.5.3595 that makes use of the Away Message vulnerability. Binds a shell to port 1180.
1e6d4bb64f8f6ded58619d8f030cb808e1322f3259b38f11c15015cfad30f9ba
Remote exploit for the Sasser worm ftpd server that spawns on port 5554.Targets included for Windows XP and 2000. Note: To use this against Sasser.e, change the port to 1023.
fe6e7139ffe5455305da5e52b63eeb8d4a419766258966ceb2ef0016e7cbe63e
Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below.
c4174e145fda328216ce0c52e5bf305b7a9f9a1cea90df103ee512f28f76a97d
Remote exploit for Windows FTP server version 1.6. Data for original vulnerability discovery made by Peter Winter-Smith here.
0aec0aed6891ae2629f8a646add69806a9b1a216e29c1bda7b123ef126e05408