Exploit for a buffer overflow in drcatd 0.5.0 beta. This may allow for command execution when the system administrator has assumed that only read access to files has been granted, but as it requires a valid username and password, this is unlikely to ever be a high-risk exploit.
0155b39c65536150f635524e364054ab87c6d89aece5942882b50c8ecf65b315
Zone-h Security Advisory - Drcatd is susceptible to multiple local and remote buffer overflows.
c443329a687a604fe5080a5f5db4419823ad5aabf4d102051246b2bd45890ea9