5 results (0.008 seconds)

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 1

The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic. La gema ftpd versión 0.2.1 para Ruby, permite a atacantes remotos ejecutar comandos arbitrarios del Sistema Operativo por medio de metacaracteres de shell en un argumento de comando LIST o NLST dentro del tráfico del protocolo FTP • http://vapidlabs.com/advisory.php?v=34 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.3EPSS: 56%CPEs: 2EXPL: 4

Open&Compact FTP Server (Open-FTPD) 1.2 and earlier allows remote attackers to bypass authentication by sending (1) LIST, (2) RETR, (3) STOR, or other commands without performing the required login steps first. El servidor FTP Open&Compact (Open-FTPD) v1.2 y anteriores permite a atacantes remotos evitar la autenticación mediante el envío de los comandos (1) LIST, (2) RETR, (3) STOR, y otros comandos sin necesidad de autenticación. • https://www.exploit-db.com/exploits/27401 https://www.exploit-db.com/exploits/13932 https://www.exploit-db.com/exploits/27556 http://secunia.com/advisories/40284 http://www.exploit-db.com/exploits/13932 - • CWE-287: Improper Authentication •

CVSS: 8.5EPSS: 0%CPEs: 4EXPL: 0

ftpd, as used by Gentoo and Debian Linux, sets the gid to the effective uid instead of the effective group id before executing /bin/ls, which allows remote authenticated users to list arbitrary directories with the privileges of gid 0 and possibly enable additional attack vectors. ftpd, como se usa en Gentoo y Debian Linux, establece el valor gid como el uid efectivo en lugar del identificador de grupo efectivo antes de ejecutar /bin/ls, lo cual permite a usuarios remotos autenticados listar directorios de su elección con privilegios de gid 0 y posiblemente habilitar vectores de ataque adicionales. • http://bugs.debian.org/384454 http://bugs.gentoo.org/show_bug.cgi?id=155317 http://osvdb.org/34242 http://packages.qa.debian.org/l/linux-ftpd/news/20061125T181702Z.html http://securityreason.com/securityalert/2330 http://www.securityfocus.com/archive/1/460742/100/0/threaded •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

ftpd in linux-ftpd 0.17, and possibly other versions, performs a chdir before setting the UID, which allows local users to bypass intended access restrictions by redirecting their home directory to a restricted directory. ftpd en linux-ftpd 0.17, y posiblemente otras versiones, efectúa un chdir antes de establecer el UID, lo cual permite a usuarios locales evitar las restricciones de acceso previstas redireccionando su directorio home a un directorio restringido. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384454 http://lists.grok.org.uk/pipermail/full-disclosure/2006-August/049014.html http://secunia.com/advisories/22997 http://security.gentoo.org/glsa/glsa-200611-05.xml http://www.debian.org/security/2006/dsa-1217 http://www.securityfocus.com/bid/21000 •

CVSS: 10.0EPSS: 26%CPEs: 1EXPL: 2

Buffer overflow in the SSL-ready version of linux-ftpd (linux-ftpd-ssl) 0.17 allows remote attackers to execute arbitrary code by creating a long directory name, then executing the XPWD command. • https://www.exploit-db.com/exploits/1295 http://seclists.org/lists/fulldisclosure/2005/Nov/0140.html http://secunia.com/advisories/17465 http://secunia.com/advisories/17529 http://secunia.com/advisories/17586 http://www.debian.org/security/2005/dsa-896 http://www.osvdb.org/20530 http://www.securityfocus.com/bid/15343 http://www.vupen.com/english/advisories/2005/2330 https://exchange.xforce.ibmcloud.com/vulnerabilities/23016 •