Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
proftpd proftpd 1.3.4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-4359
Integer overflow in kbdint.c in mod_sftp in ProFTPD 1.3.4d and 1.3.5r3 allows remote malicious users to cause a denial of service (memory consumption) via a large response count value in an authentication request, which triggers a large memory allocation.
Proftpd Proftpd 1.3.5
Proftpd Proftpd 1.3.4
NA
CVE-2012-6095
ProFTPD prior to 1.3.5rc1, when using the UserOwner directive, allows local users to modify the ownership of arbitrary files via a race condition and a symlink attack on the (1) MKD or (2) XMKD commands.
Proftpd Proftpd
Proftpd Proftpd 1.3.4
Proftpd Proftpd 1.3.2
Proftpd Proftpd 1.3.0
Proftpd Proftpd 1.2.2
Proftpd Proftpd 1.2.8
Proftpd Proftpd 1.2.7
Proftpd Proftpd 1.2.10
Proftpd Proftpd 1.3.3
Proftpd Proftpd 1.2.5
Proftpd Proftpd 1.2.4
Proftpd Proftpd 1.2.1
Proftpd Proftpd 1.2.0
Proftpd Proftpd 1.2.9
Proftpd Proftpd 1.2.6
Proftpd Proftpd 1.3.1
Proftpd Proftpd 1.2.3
NA
CVE-2011-4130
Use-after-free vulnerability in the Response API in ProFTPD prior to 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
Proftpd Proftpd 1.3.3
Proftpd Proftpd 1.3.2
Proftpd Proftpd 1.3.1
Proftpd Proftpd 1.3.0
Proftpd Proftpd 1.2.10
Proftpd Proftpd 1.2.9
Proftpd Proftpd 1.2.7
Proftpd Proftpd 1.2.5
Proftpd Proftpd 1.2.3
Proftpd Proftpd 1.2.1
Proftpd Proftpd 1.2.0
Proftpd Proftpd 1.2.8
Proftpd Proftpd 1.2.2
Proftpd Proftpd 1.2.6
Proftpd Proftpd
Proftpd Proftpd 1.2.4
2 Github repositories
1 Article
NA
CVE-2001-1501
The glob functionality in ProFTPD 1.2.1, and possibly other versions allows remote malicious users to cause a denial of service (CPU and memory consumption) via commands with large numbers of wildcard and other special characters, as demonstrated using an ls command with multiple...
Proftpd Project Proftpd 1.2.1
1 EDB exploit
NA
CVE-2011-0411
The STARTTLS implementation in Postfix 2.4.x prior to 2.4.16, 2.5.x prior to 2.5.12, 2.6.x prior to 2.6.9, and 2.7.x prior to 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle malicious users to insert commands into encrypted SMTP sessions by sending ...
Postfix Postfix 2.4
Postfix Postfix 2.4.4
Postfix Postfix 2.4.0
Postfix Postfix 2.4.9
Postfix Postfix 2.4.8
Postfix Postfix 2.4.6
Postfix Postfix 2.4.5
Postfix Postfix 2.4.14
Postfix Postfix 2.4.15
Postfix Postfix 2.4.3
Postfix Postfix 2.4.2
Postfix Postfix 2.4.10
Postfix Postfix 2.4.11
Postfix Postfix 2.4.1
Postfix Postfix 2.4.7
Postfix Postfix 2.4.12
Postfix Postfix 2.4.13
Postfix Postfix 2.5.0
Postfix Postfix 2.5.8
Postfix Postfix 2.5.9
Postfix Postfix 2.5.6
Postfix Postfix 2.5.7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
IMAP
CVE-2024-4367
server-side request forgery
information disclosure
CVE-2024-34342
CVE-2024-4281
CVE-2024-3507
CVE-2024-25560
CVE-2024-34574
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started