3 results (0.009 seconds)

CVSS: 5.1EPSS: 1%CPEs: 3EXPL: 0

Multiple signal handler race conditions in lukemftpd (aka tnftpd before 20040810) allow remote authenticated attackers to cause a denial of service or execute arbitrary code. Mültiples condiciones de carrera en lunkemftpd (también llamado tnftpd antes de 20040810) permite a atacantes remotos autentificados causar una denegación de servicio o ejecutar código de su elección. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-009.txt.asc http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/025418.html http://www.debian.org/security/2004/dsa-551 http://www.vuxml.org/freebsd/c4b025bb-f05d-11d8-9837-000c41e2cdad.html https://exchange.xforce.ibmcloud.com/vulnerabilities/17020 •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

Buffer overflow in lukemftp FTP client in SuSE 6.4 through 8.0, and possibly other operating systems, allows a malicious FTP server to execute arbitrary code via a long PASV command. • http://www.iss.net/security_center/static/9130.php http://www.novell.com/linux/security/advisories/2002_18_lukemftp.html •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

Heap overflow in the KTH Kerberos 4 FTP client 4-1.1.1 allows remote malicious servers to execute arbitrary code on the client via a long response to a passive (PASV) mode request. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0339.html http://www.iss.net/security_center/static/8938.php http://www.securityfocus.com/bid/4592 •