Page 5 of 44 results (0.006 seconds)

CVSS: 7.1EPSS: 0%CPEs: 32EXPL: 1

Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command. Múltiple eulnerabilidad de salto de directorio en el módulo mod_site_misc en ProFTPD anterior v1.3.3c permite a usuarios autenticados remotamente crear directorios, borrarlos, crear enlaces simbólicos, y modificar el timestamps de ficheros a través de secuencias de directorio transversal en un comando (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, o (4) SITE UTIME • http://bugs.proftpd.org/show_bug.cgi?id=3519 http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html http://secunia.com/advisories/42047 http://secunia.com/advisories/42052 http://secunia.com/advisories/42217 http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.498209 http: • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.8EPSS: 0%CPEs: 7EXPL: 0

The mod_tls module in ProFTPD before 1.3.2b, and 1.3.3 before 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, which allows remote attackers to bypass intended client-hostname restrictions via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. El módulo mod_tls en ProFTPD anterior v1.3.2b, y v1.3.3 anterior v1.3.3rc2, cuando la opción dNSNameRequired TLS es activada, no maneja adecuadamente el caracter '/0' en un nombre de dominio, dentro del campo Subject Alternative Name de un certificado cliente X.509, lo que permite a atacantes remotos eludir las restricciones cliente-hostname a través de un certificado manipulado concedido por una Autoridad Certificadora legítima, esta relacionado con CVE-2009-2408. • http://bugs.proftpd.org/show_bug.cgi?id=3275 http://marc.info/?l=oss-security&m=125630966510672&w=2 http://marc.info/?l=oss-security&m=125632960508211&w=2 http://secunia.com/advisories/37131 http://secunia.com/advisories/37219 http://www.debian.org/security/2009/dsa-1925 http://www.mandriva.com/security/advisories?name=MDVSA-2009:288 http://www.securityfocus.com/bid/36804 https://bugzilla.redhat.com/show_bug.cgi? • CWE-310: Cryptographic Issues •

CVSS: 7.5EPSS: 92%CPEs: 3EXPL: 2

SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution by mod_sql. Vulnerabilidad de inyección SQL en el ProFTPD Server v1.3.1 hasta v1.3.2rc2, permite a atacantes remotos ejecutar comandos SQL de su elección a través de un carácter "%" (porcentaje) en el nombre de usuario, esto introduce un carácter "'" (comilla simple) durante la sustitución de variable por mod_sql. • https://www.exploit-db.com/exploits/8037 https://www.exploit-db.com/exploits/32798 http://bugs.proftpd.org/show_bug.cgi?id=3180 http://secunia.com/advisories/34268 http://security.gentoo.org/glsa/glsa-200903-27.xml http://www.debian.org/security/2009/dsa-1730 http://www.mandriva.com/security/advisories?name=MDVSA-2009:061 http://www.openwall.com/lists/oss-security/2009/02/11/1 http://www.openwall.com/lists/oss-security/2009/02/11/3 http://www.openwall • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

ProFTPD Server 1.3.1, with NLS support enabled, allows remote attackers to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres. ProFTPD Server v1.3.1, con soporte NLS habilitado, permite a atacantes remotos evitar los mecanismos de protección de inyección SQL a través de caracteres multibyte inválidos y codificados, que no son correctamente manejados en (1) mod_sql_mysql y (2) mod_sql_postgres. • https://www.exploit-db.com/exploits/8037 http://bugs.proftpd.org/show_bug.cgi?id=3173 http://secunia.com/advisories/34268 http://security.gentoo.org/glsa/glsa-200903-27.xml http://www.debian.org/security/2009/dsa-1730 http://www.mandriva.com/security/advisories?name=MDVSA-2009:061 http://www.openwall.com/lists/oss-security/2009/02/11/4 http://www.openwall.com/lists/oss-security/2009/02/11/5 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 1

ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser. ProFTPD v1.3.1 interpreta como múltiples comandos los comandos largos de un cliente FTP, lo que permite a atacantes remotos llevar a cabo ataques de falsificación de petición en sitios cruzados (CSFR) y ejecutar comdos FTP de su elección a través de una URI ftp:// larga que aprovecha la sesión existente en la implementación de cliente FTP en un navegador web. • http://bugs.proftpd.org/show_bug.cgi?id=3115 http://secunia.com/advisories/31930 http://secunia.com/advisories/33261 http://secunia.com/advisories/33413 http://securityreason.com/achievement_securityalert/56 http://securityreason.com/securityalert/4313 http://www.debian.org/security/2008/dsa-1689 http://www.mandriva.com/security/advisories?name=MDVSA-2009:061 http://www.securityfocus.com/bid/31289 http://www.securitytracker.com/id?1020945 https://exchange.xforce.ibmcloud.com/vulnerabil • CWE-352: Cross-Site Request Forgery (CSRF) •