2 results (0.008 seconds)

CVSS: 9.0EPSS: 3%CPEs: 1EXPL: 2

Stack-based buffer overflow in RaidenFTPD 2.4 build 3620 allows remote authenticated users to cause a denial of service (crash) or execute arbitrary code via long (1) CWD and (2) MLST commands. Desbordamiento de búfer basado en pila en RaidenFTPD v2.4 build 3620 permite a usuarios remotos autenticados provocar una denegación de servicio (caída de la aplicación) o ejecutar código de su elección mediante un comando (1) CWD o un comando (2) MLST. • https://www.exploit-db.com/exploits/6742 http://secunia.com/advisories/32216 http://www.securityfocus.com/bid/31741 http://www.vupen.com/english/advisories/2008/2804 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 1

Directory traversal vulnerability in RaidenFTPD before 2.4.2241 allows remote attackers to read arbitrary files via a "..\\" (dot dot backslash) in the urlget site command. • https://www.exploit-db.com/exploits/25486 http://forum.raidenftpd.com/showflat.php?Board=UBB13&Number=45685 http://marc.info/?l=bugtraq&m=111507556127582&w=2 http://secunia.com/advisories/15037 http://www.osvdb.org/15713 http://www.securityfocus.com/bid/13292 https://exchange.xforce.ibmcloud.com/vulnerabilities/20368 •