CVE-2009-0542
- EPSS 29.68%
- Veröffentlicht 12.02.2009 16:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution...
CVE-2008-4242
- EPSS 3.39%
- Veröffentlicht 25.09.2008 19:25:18
- Zuletzt bearbeitet 09.04.2025 00:30:58
ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing ses...
CVE-2007-2165
- EPSS 2.15%
- Veröffentlicht 22.04.2007 19:19:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow rem...
CVE-2006-6563
- EPSS 0.24%
- Veröffentlicht 15.12.2006 11:28:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
CVE-2006-6171
- EPSS 3.86%
- Veröffentlicht 30.11.2006 15:28:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally...
CVE-2006-6170
- EPSS 13.97%
- Veröffentlicht 30.11.2006 15:28:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerabi...
- EPSS 59.83%
- Veröffentlicht 08.11.2006 23:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
CVE-2005-4816
- EPSS 2.84%
- Veröffentlicht 31.12.2005 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
CVE-2005-2390
- EPSS 1.24%
- Veröffentlicht 27.07.2005 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive.
CVE-2004-0432
- EPSS 1.24%
- Veröffentlicht 18.08.2004 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
ProFTPD 1.2.9 treats the Allow and Deny directives for CIDR based ACL entries as if they were AllowAll, which could allow FTP clients to bypass intended access restrictions.