Page 7 of 42 results (0.026 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 4

ProFTPD 1.2.x, including 1.2.8 and 1.2.10, responds in a different amount of time when a given username exists, which allows remote attackers to identify valid usernames by timing the server response. • https://www.exploit-db.com/exploits/581 http://marc.info/?l=bugtraq&m=109786760926133&w=2 http://security.lss.hr/index.php?page=details&ID=LSS-2004-10-02 http://securitytracker.com/id?1011687 http://www.securityfocus.com/bid/11430 https://exchange.xforce.ibmcloud.com/vulnerabilities/17724 • CWE-203: Observable Discrepancy •

CVSS: 7.5EPSS: 0%CPEs: 11EXPL: 0

ProFTPD 1.2.9 treats the Allow and Deny directives for CIDR based ACL entries as if they were AllowAll, which could allow FTP clients to bypass intended access restrictions. ProFTPD 1.2.9 trata las directivas Permitir y Denegar para ACLS basadas en CIDR como si fueran AllowAll (Permitir Todo), lo que podría permitir a clientes FTP saltarse las restricciones de acceso pretendidas. • http://bugs.proftpd.org/show_bug.cgi?id=2267 http://marc.info/?l=bugtraq&m=108335030208523&w=2 http://marc.info/?l=bugtraq&m=108335051011341&w=2 http://secunia.com/advisories/11527 http://www.mandriva.com/security/advisories?name=MDKSA-2004:041 http://www.securityfocus.com/bid/10252 https://exchange.xforce.ibmcloud.com/vulnerabilities/16038 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 1

Off-by-one buffer overflow in _xlate_ascii_write() in ProFTPD 1.2.7 through 1.2.9rc2p allows local users to gain privileges via a 1024 byte RETR command. • http://marc.info/?l=bugtraq&m=107824679817240&w=2 http://www.securityfocus.com/bid/9782 https://exchange.xforce.ibmcloud.com/vulnerabilities/15387 • CWE-193: Off-by-one Error •

CVSS: 9.0EPSS: 13%CPEs: 9EXPL: 3

ProFTPD 1.2.7 through 1.2.9rc2 does not properly translate newline characters when transferring files in ASCII mode, which allows remote attackers to execute arbitrary code via a buffer overflow using certain files. ProFTPD 1.2.7 a 1.2.9rc2 no traduce adecuadamente los caractéres de nueva línea cuando transfiere caractéres en modo ASCII, permite a atancantes remotos ejecutar código arbitrario mediante un desbordamiento de búfer usando ciertos ficheros. • https://www.exploit-db.com/exploits/23170 https://www.exploit-db.com/exploits/110 https://www.exploit-db.com/exploits/107 http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012072.html http://marc.info/?l=bugtraq&m=106441655617816&w=2 http://marc.info/?l=bugtraq&m=106606885611269&w=2 http://secunia.com/advisories/9829 http://www.kb.cert.org/vuls/id/405348 http://www.mandriva.com/security/advisories?name=MDKSA-2003:095 http://xforce.iss.net/xfo • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

SQL injection vulnerability in the PostgreSQL authentication module (mod_sql_postgres) for ProFTPD before 1.2.9rc1 allows remote attackers to execute arbitrary SQL and gain privileges by bypassing authentication or stealing passwords via the USER name. Vulnerabilidad de inyección de SQL en el módulo de autenticación de PostgreSQL (mod_sql_postgress) de ProFTPD anteriores a 1.2.9rc1 permite a atacantes remotos ejecutar SLQ arbitrario y ganar privilegios saltándose la autenticación o robando contraseñas mediante nombre de usuario (comando USER). • https://www.exploit-db.com/exploits/43 http://lists.grok.org.uk/pipermail/full-disclosure/2003-June/005826.html http://www.debian.org/security/2003/dsa-338 •