Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
No PoCs from references.
- https://github.com/5l1v3r1/0rion-Framework
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Alex2nder/meta
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CyberShade-sudo/internships
- https://github.com/M31MOTH/cve-2010-4221
- https://github.com/M41doror/cve-2010-4221
- https://github.com/Sreenivas-147/internal-penetration-testing
- https://github.com/TeamCyberHawkz/Security-Testing-
- https://github.com/ankh2054/python-exploits
- https://github.com/hackealy/Nmap
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/oneoy/cve-
- https://github.com/pedr0alencar/vlab-metasploitable2
- https://github.com/vasanth-tamil/ctf-writeups