
CVE-2024-48208
https://notcve.org/view.php?id=CVE-2024-48208
24 Oct 2024 — pure-ftpd before 1.0.52 is vulnerable to Buffer Overflow. There is an out of bounds read in the domlsd() function of the ls.c file. • https://github.com/rohilchaudhry/CVE-2024-48208 • CWE-125: Out-of-bounds Read •

CVE-2021-40524
https://notcve.org/view.php?id=CVE-2021-40524
05 Sep 2021 — In Pure-FTPd before 1.0.50, an incorrect max_filesize quota mechanism in the server allows attackers to upload files of unbounded size, which may lead to denial of service or a server hang. This occurs because a certain greater-than-zero test does not anticipate an initial -1 value. (Versions 1.0.23 through 1.0.49 are affected.) En Pure-FTPd antes de la versión 1.0.50, un mecanismo incorrecto de cuota max_filesize en el servidor permite a los atacantes subir archivos de tamaño no limitado, lo que puede llev... • https://github.com/jedisct1/pure-ftpd/commit/37ad222868e52271905b94afea4fc780d83294b4 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2020-35359
https://notcve.org/view.php?id=CVE-2020-35359
26 Dec 2020 — Pure-FTPd 1.0.48 allows remote attackers to prevent legitimate server use by making enough connections to exceed the connection limit. Pure-FTPd versión 1.0.48, permite a atacantes remotos impedir el uso legítimo del servidor haciendo suficientes conexiones para exceder el límite de conexiones • https://www.exploit-db.com/exploits/49105 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2020-9274 – Gentoo Linux Security Advisory 202003-54
https://notcve.org/view.php?id=CVE-2020-9274
26 Feb 2020 — An issue was discovered in Pure-FTPd 1.0.49. An uninitialized pointer vulnerability has been detected in the diraliases linked list. When the *lookup_alias(const char alias) or print_aliases(void) function is called, they fail to correctly detect the end of the linked list and try to access a non-existent list member. This is related to init_aliases in diraliases.c. Se detectó un problema en Pure-FTPd versión 1.0.49. • https://github.com/jedisct1/pure-ftpd/commit/8d0d42542e2cb7a56d645fbe4d0ef436e38bcefa • CWE-824: Access of Uninitialized Pointer •

CVE-2020-9365 – Gentoo Linux Security Advisory 202003-54
https://notcve.org/view.php?id=CVE-2020-9365
24 Feb 2020 — An issue was discovered in Pure-FTPd 1.0.49. An out-of-bounds (OOB) read has been detected in the pure_strcmp function in utils.c. Se detectó un problema en Pure-FTPd versión 1.0.49. Ha sido detectado una lectura fuera de límites (OOB) en la función pure_strcmp en el archivo utils.c. Multiple vulnerabilities have been found in Pure-FTPd, the worst of which could allow remote attackers to cause a Denial of Service condition. • https://github.com/jedisct1/pure-ftpd/commit/36c6d268cb190282a2c17106acfd31863121b58e • CWE-125: Out-of-bounds Read •

CVE-2019-20176
https://notcve.org/view.php?id=CVE-2019-20176
31 Dec 2019 — In Pure-FTPd 1.0.49, a stack exhaustion issue was discovered in the listdir function in ls.c. En Pure-FTPd versión 1.0.49, Se descubrió un problema de agotamiento de la pila en la función listdir en el archivo ls.c. • https://github.com/jedisct1/pure-ftpd/commit/aea56f4bcb9948d456f3fae4d044fd3fa2e19706 • CWE-400: Uncontrolled Resource Consumption •

CVE-2017-12170
https://notcve.org/view.php?id=CVE-2017-12170
21 Sep 2017 — Downstream version 1.0.46-1 of pure-ftpd as shipped in Fedora was vulnerable to packaging error due to which the original configuration was ignored after update and service started running with default configuration. This has security implications because of overriding security-related configuration. This issue doesn't affect upstream version of pure-ftpd. La versión downstream 1.0.46-1 de pure-ftpd, tal y como viene distribuido en Fedora, es vulnerable a los errores de empaquetado ya que se ignora la confi... • https://bugzilla.redhat.com/show_bug.cgi?id=1493114 •

CVE-2011-3171
https://notcve.org/view.php?id=CVE-2011-3171
04 Nov 2011 — Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors. Una vulnerabilidad de salto de directorio en Pure-ftpd v1.0.22 y posiblemente en otras versiones, cuando se ejecutan en SUSE Linux Enterprise Server y posiblemente otros sistemas operativos y cuando la función de servidor ... • http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00015.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2011-0418 – FreeBSD 9.1 - 'ftpd' Remote Denial of Service
https://notcve.org/view.php?id=CVE-2011-0418
24 May 2011 — The glob implementation in Pure-FTPd before 1.0.32, and in libc in NetBSD 5.1, does not properly expand expressions containing curly brackets, which allows remote authenticated users to cause a denial of service (memory consumption) via a crafted FTP STAT command. La implementación del comando glob de Pure-FTPd en versiones anteriores a 1.0.32, y en libc de NetBSD 5.1, no expande apropiadamente las expresiones que contienen llaves, lo que permite a usuarios autenticados remotos provocar una denegación de se... • https://www.exploit-db.com/exploits/24450 • CWE-20: Improper Input Validation •

CVE-2011-1575
https://notcve.org/view.php?id=CVE-2011-1575
23 May 2011 — The STARTTLS implementation in ftp_parser.c in Pure-FTPd before 1.0.30 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted FTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. La implementación de STARTTLS en ftp_parser.c de Pure-FTPd en versiones anteriores a 1.0.30 no restringe correctamente el buffer de entrada/salida, que pe... • https://github.com/masamoon/cve-2011-1575-poc • CWE-399: Resource Management Errors •