Proftpd

Proftpd

31 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.13%
  • Veröffentlicht 06.12.2011 11:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.

Exploit
  • EPSS 2.57%
  • Veröffentlicht 11.03.2011 17:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in the mod_sftp (aka SFTP) module in ProFTPD 1.3.3d and earlier allows remote attackers to cause a denial of service (memory consumption leading to OOM kill) via a malformed SSH message.

Exploit
  • EPSS 7.02%
  • Veröffentlicht 02.02.2011 01:00:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted usernam...

Exploit
  • EPSS 90.95%
  • Veröffentlicht 09.11.2010 21:00:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.

Exploit
  • EPSS 0.22%
  • Veröffentlicht 09.11.2010 21:00:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequence...

  • EPSS 0.33%
  • Veröffentlicht 09.11.2010 21:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The pr_data_xfer function in ProFTPD before 1.3.2rc3 allows remote authenticated users to cause a denial of service (CPU consumption) via an ABOR command during a data transfer.

  • EPSS 1.3%
  • Veröffentlicht 28.10.2009 14:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The mod_tls module in ProFTPD before 1.3.2b, and 1.3.3 before 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, w...

  • EPSS 0.79%
  • Veröffentlicht 12.02.2009 16:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

ProFTPD Server 1.3.1, with NLS support enabled, allows remote attackers to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 23.11.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Off-by-one buffer overflow in _xlate_ascii_write() in ProFTPD 1.2.7 through 1.2.9rc2p allows local users to gain privileges via a 1024 byte RETR command.

Exploit
  • EPSS 0.83%
  • Veröffentlicht 15.10.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ProFTPD 1.2.x, including 1.2.8 and 1.2.10, responds in a different amount of time when a given username exists, which allows remote attackers to identify valid usernames by timing the server response.