CVE-2001-1501 – WU-FTPD 2.4/2.5/2.6 / Trolltech ftpd 1.2 / ProFTPd 1.2 / BeroFTPD 1.3.4 FTP - glob Expansion
https://notcve.org/view.php?id=CVE-2001-1501
The glob functionality in ProFTPD 1.2.1, and possibly other versions allows remote attackers to cause a denial of service (CPU and memory consumption) via commands with large numbers of wildcard and other special characters, as demonstrated using an ls command with multiple (1) "*/..", (2) "*/.*", or (3) ".*./*?/" sequences in the argument. • https://www.exploit-db.com/exploits/20690 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000450 http://online.securityfocus.com/archive/1/169395 http://www.mandriva.com/security/advisories?name=MDKSA-2002:005 •
CVE-2001-1500
https://notcve.org/view.php?id=CVE-2001-1500
ProFTPD 1.2.2rc2, and possibly other versions, does not properly verify reverse-resolved hostnames by performing forward resolution, which allows remote attackers to bypass ACLs or cause an incorrect client hostname to be logged. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000450 http://www.mandriva.com/security/advisories?name=MDKSA-2002:005 http://www.securityfocus.com/archive/1/212805 http://www.securityfocus.com/bid/3310 https://exchange.xforce.ibmcloud.com/vulnerabilities/7126 •
CVE-2001-0318
https://notcve.org/view.php?id=CVE-2001-0318
Format string vulnerability in ProFTPD 1.2.0rc2 may allow attackers to execute arbitrary commands by shutting down the FTP server while using a malformed working directory (cwd). • http://archives.neohapsis.com/archives/bugtraq/2001-02/0117.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000380 http://marc.info/?l=bugtraq&m=97916525715657&w=2 http://www.debian.org/security/2001/dsa-029 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-021.php3 https://exchange.xforce.ibmcloud.com/vulnerabilities/6433 •
CVE-2001-0136 – ProFTPd 1.2.0 pre10 - Remote Denial of Service
https://notcve.org/view.php?id=CVE-2001-0136
Memory leak in ProFTPd 1.2.0rc2 allows remote attackers to cause a denial of service via a series of USER commands, and possibly SIZE commands if the server has been improperly installed. • https://www.exploit-db.com/exploits/244 https://www.exploit-db.com/exploits/241 https://www.exploit-db.com/exploits/20536 http://archives.neohapsis.com/archives/bugtraq/2001-01/0122.html http://archives.neohapsis.com/archives/bugtraq/2001-01/0132.html http://archives.neohapsis.com/archives/bugtraq/2001-02/0267.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000380 http://www.debian.org/security/2001/dsa-029 http://www.linux-mandrake.com/en/security/2001 • CWE-401: Missing Release of Memory after Effective Lifetime •