Page 7 of 34 results (0.009 seconds)

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 1

The glob functionality in ProFTPD 1.2.1, and possibly other versions allows remote attackers to cause a denial of service (CPU and memory consumption) via commands with large numbers of wildcard and other special characters, as demonstrated using an ls command with multiple (1) "*/..", (2) "*/.*", or (3) ".*./*?/" sequences in the argument. • https://www.exploit-db.com/exploits/20690 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000450 http://online.securityfocus.com/archive/1/169395 http://www.mandriva.com/security/advisories?name=MDKSA-2002:005 •

CVSS: 7.5EPSS: 0%CPEs: 17EXPL: 0

ProFTPD 1.2.2rc2, and possibly other versions, does not properly verify reverse-resolved hostnames by performing forward resolution, which allows remote attackers to bypass ACLs or cause an incorrect client hostname to be logged. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000450 http://www.mandriva.com/security/advisories?name=MDKSA-2002:005 http://www.securityfocus.com/archive/1/212805 http://www.securityfocus.com/bid/3310 https://exchange.xforce.ibmcloud.com/vulnerabilities/7126 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Format string vulnerability in ProFTPD 1.2.0rc2 may allow attackers to execute arbitrary commands by shutting down the FTP server while using a malformed working directory (cwd). • http://archives.neohapsis.com/archives/bugtraq/2001-02/0117.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000380 http://marc.info/?l=bugtraq&m=97916525715657&w=2 http://www.debian.org/security/2001/dsa-029 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-021.php3 https://exchange.xforce.ibmcloud.com/vulnerabilities/6433 •

CVSS: 5.0EPSS: 4%CPEs: 4EXPL: 5

Memory leak in ProFTPd 1.2.0rc2 allows remote attackers to cause a denial of service via a series of USER commands, and possibly SIZE commands if the server has been improperly installed. • https://www.exploit-db.com/exploits/244 https://www.exploit-db.com/exploits/241 https://www.exploit-db.com/exploits/20536 http://archives.neohapsis.com/archives/bugtraq/2001-01/0122.html http://archives.neohapsis.com/archives/bugtraq/2001-01/0132.html http://archives.neohapsis.com/archives/bugtraq/2001-02/0267.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000380 http://www.debian.org/security/2001/dsa-029 http://www.linux-mandrake.com/en/security/2001 • CWE-401: Missing Release of Memory after Effective Lifetime •