Page 4 of 20 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Format string vulnerability in ProFTPD 1.2.0rc2 may allow attackers to execute arbitrary commands by shutting down the FTP server while using a malformed working directory (cwd). • http://archives.neohapsis.com/archives/bugtraq/2001-02/0117.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000380 http://marc.info/?l=bugtraq&m=97916525715657&w=2 http://www.debian.org/security/2001/dsa-029 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-021.php3 https://exchange.xforce.ibmcloud.com/vulnerabilities/6433 •

CVSS: 7.5EPSS: 4%CPEs: 1EXPL: 1

mod_sqlpw module in ProFTPD does not reset a cached password when a user uses the "user" command to change accounts, which allows authenticated attackers to gain privileges of other users. • http://archives.neohapsis.com/archives/bugtraq/2000-12/0139.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5737 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

ProFTPd 1.2 compiled with the mod_sqlpw module records user passwords in the wtmp log file, which allows local users to obtain the passwords and gain privileges by reading wtmp, e.g. via the last command. • http://www.securityfocus.com/archive/1/35483 http://www.securityfocus.com/bid/812 •

CVSS: 10.0EPSS: 2%CPEs: 5EXPL: 2

Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories. • https://www.exploit-db.com/exploits/19475 https://www.exploit-db.com/exploits/19476 http://www.debian.org/security/1999/19990210 http://www.securityfocus.com/bid/612 •

CVSS: 10.0EPSS: 8%CPEs: 17EXPL: 2

Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto. • https://www.exploit-db.com/exploits/19086 https://www.exploit-db.com/exploits/19087 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0368 •