Lucene search

K
Proftpd ProjectProftpd

5 matches found

CVE
CVE
added 2006/11/08 11:7 p.m.68 views

CVE-2006-5815

Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."

10CVSS7.2AI score0.62385EPSS
CVE
CVE
added 2006/11/30 3:28 p.m.54 views

CVE-2006-6171

ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an er...

7.5CVSS6AI score0.62385EPSS
CVE
CVE
added 2006/11/30 3:28 p.m.53 views

CVE-2006-6170

Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.

7.5CVSS7.5AI score0.62385EPSS
CVE
CVE
added 2006/12/23 11:0 a.m.48 views

CVE-2005-4816

Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.

7.5CVSS7.8AI score0.02566EPSS
CVE
CVE
added 2006/12/15 11:28 a.m.47 views

CVE-2006-6563

Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.

6.6CVSS7.3AI score0.00177EPSS