Example script that exploits the poc.mail.local.txt (mail.local) security hole.
da41d2dae164a4557d6998e2fca3ac80383e4ac5caaab5ac71b14ec02dce8aec
Example script to test for the ncftpd.txt (NcFTPd) security exploit.
f662640f6c2994030cb4786d5747a8b803f7f8564ddd7f013919b672ce04cb9f
Example script that exploits the poc.mail.local.txt (mail.local) security hole.
33008441bf71060f041ab7d57a1c8ed7eb2bf57f991fb1f98d2a75fe0f8b7cb4
NcFTPd FTP server contains stack buffer overflows that can result in Denial of Service attacks, log compromise, and theoretical remote root compromise.
162c5824e0b78f3267db3e2594285af8731f98593ebb0c4310a1bc81b03465d1
NcFTPd does not confirm that destination PORT addresses belong to correct user IPs, allowing anyone to transmit data from the server anywhere, anonymously. Denial of Service attacks and spoofed sessions can result. Fix included.
b8bb215caf5d724762bfea702c20250dfa706e8e6ba4bb9b427f646097e9758f
Berkeley Sendmail's mail.local allows any local user to dump anything into any user's mailbox, with no length limitation - which means any user can use the program to flood a mailbox or hard drive, or send fake (spoofed) messages, with no way of being traced.
64ada8a0707843b0e3a17e5ef2ac0e38c374e081a9e66530369f847c8a5ec361