Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
proftpd proftpd 1.3.3 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-4221
Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD prior to 1.3.3c allow remote malicious users to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
Proftpd Proftpd 1.3.2
Proftpd Proftpd 1.3.3
3 EDB exploits
2 Nmap scripts
4 Github repositories
9
CVSSv2
CVE-2011-4130
Use-after-free vulnerability in the Response API in ProFTPD prior to 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
Proftpd Proftpd 1.3.3
Proftpd Proftpd 1.3.2
Proftpd Proftpd 1.3.1
Proftpd Proftpd 1.3.0
Proftpd Proftpd 1.2.10
Proftpd Proftpd 1.2.9
Proftpd Proftpd 1.2.7
Proftpd Proftpd 1.2.5
Proftpd Proftpd 1.2.3
Proftpd Proftpd 1.2.1
Proftpd Proftpd 1.2.0
Proftpd Proftpd 1.2.8
Proftpd Proftpd 1.2.2
Proftpd Proftpd 1.2.6
Proftpd Proftpd
Proftpd Proftpd 1.2.4
2 Github repositories
1 Article
7.1
CVSSv2
CVE-2010-3867
Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD prior to 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) S...
Proftpd Proftpd 1.3.0
Proftpd Proftpd 1.3.1
Proftpd Proftpd 1.3.2
Proftpd Proftpd 1.3.3
Proftpd Proftpd 1.2.10
2 Github repositories
1 Article
6.8
CVSSv2
CVE-2010-4652
Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD prior to 1.3.3d, when mod_sql is enabled, allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitut...
Proftpd Proftpd 1.3.1
Proftpd Proftpd 1.3.0
Proftpd Proftpd 1.2.10
Proftpd Proftpd 1.3.3
Proftpd Proftpd 1.2.4
Proftpd Proftpd 1.2.3
Proftpd Proftpd 1.2.0
Proftpd Proftpd 1.2.8
Proftpd Proftpd 1.2.6
Proftpd Proftpd 1.3.2
Proftpd Proftpd 1.2.2
Proftpd Proftpd 1.2.1
Proftpd Proftpd 1.2.9
Proftpd Proftpd 1.2.7
Proftpd Proftpd 1.2.5
Proftpd Proftpd
1 Github repository
5.8
CVSSv2
CVE-2009-3639
The mod_tls module in ProFTPD prior to 1.3.2b, and 1.3.3 prior to 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, which allows remo...
Proftpd Proftpd
Proftpd Proftpd 1.3.3
Proftpd Proftpd 1.3.2
Proftpd Proftpd 1.3.1
5
CVSSv2
CVE-2011-1137
Integer overflow in the mod_sftp (aka SFTP) module in ProFTPD 1.3.3d and previous versions allows remote malicious users to cause a denial of service (memory consumption leading to OOM kill) via a malformed SSH message.
Proftpd Proftpd 1.3.1
Proftpd Proftpd 1.3.2
Proftpd Proftpd 1.3.0
Proftpd Proftpd 1.3.3
Proftpd Proftpd 1.2.2
Proftpd Proftpd 1.2.0
Proftpd Proftpd 1.2.8
Proftpd Proftpd 1.2.9
Proftpd Proftpd 1.2.5
Proftpd Proftpd 1.2.7
Proftpd Proftpd 1.2.10
Proftpd Proftpd 1.2.4
Proftpd Proftpd 1.2.6
Proftpd Proftpd 1.2.1
Proftpd Proftpd
Proftpd Proftpd 1.2.3
1 EDB exploit
1.2
CVSSv2
CVE-2012-6095
ProFTPD prior to 1.3.5rc1, when using the UserOwner directive, allows local users to modify the ownership of arbitrary files via a race condition and a symlink attack on the (1) MKD or (2) XMKD commands.
Proftpd Proftpd
Proftpd Proftpd 1.3.4
Proftpd Proftpd 1.3.2
Proftpd Proftpd 1.3.0
Proftpd Proftpd 1.2.2
Proftpd Proftpd 1.2.8
Proftpd Proftpd 1.2.7
Proftpd Proftpd 1.2.10
Proftpd Proftpd 1.3.3
Proftpd Proftpd 1.2.5
Proftpd Proftpd 1.2.4
Proftpd Proftpd 1.2.1
Proftpd Proftpd 1.2.0
Proftpd Proftpd 1.2.9
Proftpd Proftpd 1.2.6
Proftpd Proftpd 1.3.1
Proftpd Proftpd 1.2.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started