3 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Unspecified vulnerability in vsftpd 3.0.2 and earlier allows remote attackers to bypass access restrictions via unknown vectors, related to deny_file parsing. Una vulnerabilidad no especificada en vsftpd versiones 3.0.2 y anteriores permite a los atacantes remotos omitir las restricciones de acceso por medio de vectores desconocidos, relacionados con el análisis deny_file. • http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00023.html http://lists.opensuse.org/opensuse-updates/2015-01/msg00041.html http://secunia.com/advisories/62415 •

CVSS: 5.0EPSS: 18%CPEs: 2EXPL: 0

vsftpd before 1.2.2, when under heavy load, allows attackers to cause a denial of service (crash) via a SIGCHLD signal during a malloc or free call, which is not re-entrant. • ftp://vsftpd.beasts.org/users/cevans/untar/vsftpd-1.2.2/Changelog http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=119136 http://rhn.redhat.com/errata/RHBA-2004-164.html http://secunia.com/advisories/11680 http://secunia.com/advisories/11736 http://www.osvdb.org/6306 http://www.securityfocus.com/bid/10394 https://exchange.xforce.ibmcloud.com/vulnerabilities/16222 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11049 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

vsftpd 1.1.3 generates different error messages depending on whether or not a valid username exists, which allows remote attackers to identify valid usernames. vsftpd 1.1.3 genera diferentes mensajes de error dependiendo de si existe o no un nombre de usuario válido, lo que permite que atacantes remotos identifiquen nombres de usuarios válidos. • http://securitytracker.com/id?1008628 •