5 results (0.004 seconds)

CVSS: 6.8EPSS: 0%CPEs: 3EXPL: 0

tnftpd before 20080929 splits large command strings into multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via unknown vectors, probably involving a crafted ftp:// link to a tnftpd server. tnftpd, en versiones anteriores a la 20080929 divide largas cadenas de comandos en múltiples comandos, lo que permite a atacantes remotos llevar a cabo ataques de falsificación de petición en sitios cruzados (CSFR) mediante vectores desconocidos, probablemente en relación con un enlace ftp:// manipulado para un servidor tnftpd. • http://freshmeat.net/projects/tnftpd/?branch_id=14355&release_id=285654# http://osvdb.org/48637 http://secunia.com/advisories/31958 https://exchange.xforce.ibmcloud.com/vulnerabilities/45534 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

The mget function in cmds.c for tnftp 20030825 allows remote FTP servers to overwrite arbitrary files via FTP responses containing file names with / (slash) characters. La función mget en cmds.c de tnftp 2003025 permite a servidores FTP remotos sobreescribir ficheros arbitrarios mediante respuestas FTP conteniendo nombres de ficheros con caractéres / (barra). • http://tigger.uic.edu/~jlongs2/holes/tnftp.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/18560 •

CVSS: 5.1EPSS: 1%CPEs: 3EXPL: 0

Multiple signal handler race conditions in lukemftpd (aka tnftpd before 20040810) allow remote authenticated attackers to cause a denial of service or execute arbitrary code. Mültiples condiciones de carrera en lunkemftpd (también llamado tnftpd antes de 20040810) permite a atacantes remotos autentificados causar una denegación de servicio o ejecutar código de su elección. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-009.txt.asc http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/025418.html http://www.debian.org/security/2004/dsa-551 http://www.vuxml.org/freebsd/c4b025bb-f05d-11d8-9837-000c41e2cdad.html https://exchange.xforce.ibmcloud.com/vulnerabilities/17020 •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in lukemftp FTP client in SuSE 6.4 through 8.0, and possibly other operating systems, allows a malicious FTP server to execute arbitrary code via a long PASV command. • http://www.iss.net/security_center/static/9130.php http://www.novell.com/linux/security/advisories/2002_18_lukemftp.html •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

Heap overflow in the KTH Kerberos 4 FTP client 4-1.1.1 allows remote malicious servers to execute arbitrary code on the client via a long response to a passive (PASV) mode request. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0339.html http://www.iss.net/security_center/static/8938.php http://www.securityfocus.com/bid/4592 •