ProFTPd version 1.3.5 remote command execution exploit. This is a variant of the original vulnerability discovered in 2015 with credit going to R-73eN.
36d3e6266ecfe1baa5561af1301eeadc1a956f587f58731fbeed05f16dec3a89
Secunia Security Advisory - Debian has issued an update for proftpd-dfsg. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site request forgery attacks.
40f3dc14ad396ae8692b8f0f7880546941950b1b52307aa76a2d46ca5ce95b67
Secunia Security Advisory - A vulnerability has been reported in ProFTPD, which can be exploited by malicious people to conduct cross-site request forgery attacks.
29d26366e0236b1083c64fb95da56c9c28c5d94072b3687db0a1b1efab5fe799
Secunia Security Advisory - Fedora has issued an update for proftpd. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions.
f4dbf296173bc1c943ecec93a9a30a882dbcbd395904eb0551e03bbcd718f160
ProFTPD version 1.x mod_tls remote buffer overflow exploit.
e305a0aebe2e6838e00afea9176096597703a5b44e1443912a6521d4d284f8fe
Mandriva Linux Security Advisory - The Auth API in ProFTPD, when multiple simultaneous authentication modules are configured, did not require that the module that checks authentication is the same module that retrieves authentication data, which could possibly be used to allow remote attackers to bypass authentication. The updated packages have been patched to prevent this issue. As well, this update provides proper PAM configuration files for ProFTPD on Corporate Server 4 that had prevented any mod_auth_pam-based connections from succeeding authentication.
ad147280c64e52fd7ef4848541a3149f3cee31c56e0ab7c29920dbc42e6e83be
Secunia Security Advisory - A security issue has been reported in ProFTPD, which potentially can be exploited by malicious people to bypass certain security restrictions.
c01a87714715d33ceae32e75142de8f22b0578704b0118d23ee57fbd5255daee
ProFTPD versions 1.3.0 and 1.3.0a local overflow exploit.
f226fa4b69a0b38b89856b6fdf13dd0cae57a2c097428ced1cb703ee6948d130
ProFTPD versions 1.3.0 and 1.3.0a controls local root exploit that binds a shell to tcp/31337. This one works for the 2.6 kernel series.
e0a4c6200d855daaf07102fcb5e84b2ce34bf9775307a3c4ea16a0e2bec9460d
ProFTPD versions 1.3.0 and 1.3.0a controls local root exploit that binds a shell to tcp/31337.
62ebb6b9d642bc1e0e8688dea06dbc7bbe61c1d6177fa589d23cb7b06aaaac39
Gentoo Linux Security Advisory GLSA 200702-02 - A flaw exists in the mod_ctrls module of ProFTPD, normally used to allow FTP server administrators to configure the daemon at runtime. Versions less than 1.3.1_rc1 are affected.
e3494f4786d21ba459f57467fc252395dccb62ce7f6364e4e60eb0550b575d8d
Secunia Security Advisory - Gentoo has issued an update for proftpd. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.
734f69ad2f4590980eae16c04ed89d9fe066ee874d3c967e6f2bbaa5921a9059
Debian Security Advisory 1245-1 - Martin Loewer discovered that the proftpd FTP daemon is vulnerable to denial of service if the addon module for Radius authentication is enabled.
50fcc58bdb5e7e7fdd77b15acebd5b68c5c089cd4d7cb3553c68bfafab2f21cb
Secunia Security Advisory - Trustix has issued an update for proftpd. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.
6963f11fc22858d4b9afb2ff54c10c7d6c99320d746e461a7c674fad57f733f3
Mandriva Linux Security Advisory MDKSA-2006-232 - Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
19684dc412aa4f5dcaad3be1dbe50d4856d46cea887bc1020314e7baf3c625ab
Secunia Security Advisory - Mandriva has issued an update for proftpd. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.
e8e6e2f270ccd05d1fb682994628d53dad25cd7d56a47c39a4380fe23d74aaa8
Core Security Technologies Advisory - A locally exploitable stack overflow vulnerability has been found in the mod_ctrls module of ProFTPD server. ProFTPD versions 1.3.0a and 1.3.0 are affected.
d36acaee71f87bea897777e3ff93edf6478e47c07c9a9d32a58514040e1ae1cf
Secunia Security Advisory - Alfredo Ortega has reported a vulnerability in the mod_ctrls module for ProFTPD, which can be exploited by malicious, local users to gain escalated privileges.
bba0b07949d2ab7e7c5c3848dd07716262ab777a9ddd36a68189897ef79608b2
Secunia Security Advisory - Trustix has issued an update for gnupg and proftpd. This fixes some vulnerabilities, which potentially can be exploited by malicious users and malicious people to compromise a vulnerable system.
20aef66918667380e15565fcf7f61a5c627f68a75042f8863545a432935fec11
Debian Security Advisory 1222-2 - Due to technical problems yesterday's proftpd update lacked a build for the amd64 architecture, which is now available. Several remote vulnerabilities have been discovered in the proftpd FTP daemon, which may lead to the execution of arbitrary code or denial of service.
b6cf6ad61f34245ebd9b4e72ef0bee6c823bdb1f06c59ff4c77354091c5374c9
Mandriva Linux Security Advisory - Multiple vulnerabilities exist in ProFTPd versions 1.3.0a and below.
e2171be169bfd780fec771b7e39e63a762c38535f944aa32aed8c1273821ce01
Debian Security Advisory 1222-1 - Several remote vulnerabilities have been discovered in the proftpd FTP daemon, which may lead to the execution of arbitrary code or denial of service.
c12800e6db0918beeb56fcbd6c44c2e32fc8823002ebfbc8af9853095cfdc2b7
Secunia Security Advisory - Debian has issued an update for proftpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and by malicious users and malicious people to potentially compromise a vulnerable system.
668de37665cc2169c77eba151c65aef8e33bdfaa5d7c30d9e974012ae15d5a5c
Secunia Security Advisory - Gentoo has issued an update for proftpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and by malicious users and malicious people to potentially compromise a vulnerable system.
6a7c3239e0278fa2f6892cb5a25736c446f03524686984f0effbd107d3c919fa
Secunia Security Advisory - Mandriva has issued an update for proftpd. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system.
d1949ef8a59c39f92d4245a7947981d2d166c0e82b848aaa03192b3dabc62136
Secunia Security Advisory - Slackware has issued an update for proftpd. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to potentially compromise a vulnerable system.
53e22115636efd8b1c5f0280dba1793433394ad763a124a9ee209d770fca826e