exploitdb
WORKING POC
VERIFIED
by redsand · remotewindows
https://www.exploit-db.com/exploits/1452
This exploit targets a stack overflow vulnerability in PMSoftware Samftpd's log handler. It sends a maliciously crafted PASS command with a long buffer to overwrite the return address and execute shellcode.
Classification
Working Poc 95%
Target:
PMSoftware Samftpd (versions affected by CVE-2006-0441)
No auth needed
Prerequisites:
Network access to the FTP service · Target system running vulnerable Samftpd version
exploitdb
WORKING POC
VERIFIED
by Marsu · cdoswindows
https://www.exploit-db.com/exploits/3127
This exploit triggers a buffer overflow in KarjaSoft Sami FTP Server 2.0.2 by sending an overly long USER/PASS request, overwriting EAX and EDX registers. It demonstrates a denial-of-service condition but does not include shellcode for remote code execution.
Classification
Working Poc 90%
Target:
KarjaSoft Sami FTP Server 2.0.2
No auth needed
Prerequisites:
Network access to the FTP server
exploitdb
WORKING POC
VERIFIED
by HolyGhost · c++remotewindows
https://www.exploit-db.com/exploits/1462
This exploit targets a buffer overflow vulnerability in Sami FTP Server, leveraging a crafted payload with NOP sleds and shellcode to achieve remote code execution. The shellcode binds a shell to port 777.
Classification
Working Poc 95%
Target:
Sami FTP Server
No auth needed
Prerequisites:
Network access to the target FTP server · Target must be running Sami FTP Server
exploitdb
WORKING POC
VERIFIED
by Critical Security · perlremotewindows
https://www.exploit-db.com/exploits/1448
This exploit targets Sami FTP Server v2.0.1 by leveraging a buffer overflow vulnerability to execute arbitrary code (notepad.exe) via a crafted username during login. It uses a variety of return addresses for different Windows and FreeBSD/Wine environments.
Classification
Working Poc 95%
Target:
Sami FTP Server v2.0.1
No auth needed
Prerequisites:
Network access to the target FTP server · Knowledge of the target's OS and service pack for correct offset selection
exploitdb
WORKING POC
VERIFIED
by UmZ · perlremotewindows
https://www.exploit-db.com/exploits/3140
This exploit targets a buffer overflow vulnerability in SAMI FTP Server 2.0.2, allowing arbitrary remote code execution via a crafted USER command. The shellcode spawns calc.exe as a proof of concept.
Classification
Working Poc 95%
Target:
SAMI FTP Server 2.0.2
No auth needed
Prerequisites:
Network access to the target FTP server · SAMI FTP Server 2.0.2 running on Windows 2000 SP4 (or adjusted return address for other versions)
exploitdb
WORKING POC
VERIFIED
by n30m1nd · pythonremotewindows
https://www.exploit-db.com/exploits/40675
This exploit targets a buffer overflow vulnerability in Sami FTP Server 2.0.2 by overwriting SEH and executing a bind shellcode on port 4444. It uses a combination of alignment, SEH overwrite, and shellcode execution to achieve remote code execution.
Classification
Working Poc 95%
Target:
Sami FTP Server 2.0.2
No auth needed
Prerequisites:
Network access to the target FTP server · Sami FTP Server 2.0.2 running on the target
exploitdb
WORKING POC
rubyremotewindows
https://www.exploit-db.com/exploits/16702
This Metasploit module exploits a stack-based buffer overflow in KarjaSoft Sami FTP Server v2.02 via an excessively long USER command. The exploit is passive, requiring administrator interaction to view FTP logs for execution.
Classification
Working Poc 100%
Target:
KarjaSoft Sami FTP Server v2.02
No auth needed
Prerequisites:
Network access to the FTP server · Administrator interaction to view logs