Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
proftpd proftpd vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1602
ProFTPD 1.2.x, including 1.2.8 and 1.2.10, responds in a different amount of time when a given username exists, which allows remote malicious users to identify valid usernames by timing the server response.
Proftpd Proftpd
1 EDB exploit
7.5
CVSSv3
CVE-2021-46854
mod_radius in ProFTPD prior to 1.3.7c allows memory disclosure to RADIUS servers because it copies blocks of 16 characters.
Proftpd Proftpd
7.5
CVSSv3
CVE-2019-19271
An issue exists in tls_verify_crl in ProFTPD prior to 1.3.6. A wrong iteration variable, used when checking a client certificate against CRL entries (installed by a system administrator), can cause some CRL entries to be ignored, and can allow clients whose certificates have been...
Proftpd Proftpd
7.5
CVSSv3
CVE-2023-51713
make_ftp_cmd in main.c in ProFTPD prior to 1.3.8a has a one-byte out-of-bounds read, and daemon crash, because of mishandling of quote/backslash semantics.
Proftpd Proftpd
7.5
CVSSv3
CVE-2019-19272
An issue exists in tls_verify_crl in ProFTPD prior to 1.3.6. Direct dereference of a NULL pointer (a variable initialized to NULL) leads to a crash when validating the certificate of a client connecting to the server in a TLS client/server mutual-authentication setup.
Proftpd Proftpd
7.5
CVSSv3
CVE-2016-3125
The mod_tls module in ProFTPD prior to 1.3.5b and 1.3.6 prior to 1.3.6rc2 does not properly handle the TLSDHParamFile directive, which might cause a weaker than intended Diffie-Hellman (DH) key to be used and consequently allow malicious users to have unspecified impact via unkno...
Proftpd Proftpd 1.3.6
Proftpd Proftpd
Opensuse Opensuse 13.1
Fedoraproject Fedora 22
Fedoraproject Fedora 23
4.9
CVSSv3
CVE-2019-19269
An issue exists in tls_verify_crl in ProFTPD up to and including 1.3.6b. A dereference of a NULL pointer may occur. This pointer is returned by the OpenSSL sk_X509_REVOKED_value() function when encountering an empty CRL installed by a system administrator. The dereference occurs ...
Proftpd Proftpd 1.3.6
Proftpd Proftpd
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 8.0
NA
CVE-2009-0543
ProFTPD Server 1.3.1, with NLS support enabled, allows remote malicious users to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.
Proftpd Proftpd 1.3.1
1 EDB exploit
1 Github repository
NA
CVE-2006-6170
Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and previous versions, and possibly other products, allows remote malicious users to execute arbitrary code via a large data length argument, a different vulnerability than CVE-...
Proftpd Project Proftpd
NA
CVE-2006-6171
ProFTPD 1.3.0a and previous versions does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-...
Proftpd Project Proftpd
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »