what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

ProFTPd 1.3.5 Remote Command Execution
Posted May 26, 2021
Authored by Shellbr3ak

ProFTPd version 1.3.5 remote command execution exploit. This is a variant of the original vulnerability discovered in 2015 with credit going to R-73eN.

tags | exploit, remote
advisories | CVE-2015-3306
SHA-256 | 36d3e6266ecfe1baa5561af1301eeadc1a956f587f58731fbeed05f16dec3a89

Related Files

Secunia Security Advisory 33261
Posted Dec 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for proftpd-dfsg. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
systems | linux, debian
SHA-256 | 40f3dc14ad396ae8692b8f0f7880546941950b1b52307aa76a2d46ca5ce95b67
Secunia Security Advisory 31930
Posted Sep 22, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ProFTPD, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 29d26366e0236b1083c64fb95da56c9c28c5d94072b3687db0a1b1efab5fe799
Secunia Security Advisory 27516
Posted Nov 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for proftpd. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | f4dbf296173bc1c943ecec93a9a30a882dbcbd395904eb0551e03bbcd718f160
proftpd-overflow.txt
Posted Aug 24, 2007
Authored by netris

ProFTPD version 1.x mod_tls remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | e305a0aebe2e6838e00afea9176096597703a5b44e1443912a6521d4d284f8fe
Mandriva Linux Security Advisory 2007.130
Posted Jun 21, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The Auth API in ProFTPD, when multiple simultaneous authentication modules are configured, did not require that the module that checks authentication is the same module that retrieves authentication data, which could possibly be used to allow remote attackers to bypass authentication. The updated packages have been patched to prevent this issue. As well, this update provides proper PAM configuration files for ProFTPD on Corporate Server 4 that had prevented any mod_auth_pam-based connections from succeeding authentication.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2007-2165
SHA-256 | ad147280c64e52fd7ef4848541a3149f3cee31c56e0ab7c29920dbc42e6e83be
Secunia Security Advisory 24867
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in ProFTPD, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | c01a87714715d33ceae32e75142de8f22b0578704b0118d23ee57fbd5255daee
pr0ftpd_modctrls.tgz
Posted Apr 17, 2007
Authored by Xpl017Elz | Site inetcop.org

ProFTPD versions 1.3.0 and 1.3.0a local overflow exploit.

tags | exploit, overflow, local
SHA-256 | f226fa4b69a0b38b89856b6fdf13dd0cae57a2c097428ced1cb703ee6948d130
revenge_proftpd_ctrls_26.pl.txt
Posted Feb 20, 2007
Authored by Alfredo Pesoli | Site 0xcafebabe.it

ProFTPD versions 1.3.0 and 1.3.0a controls local root exploit that binds a shell to tcp/31337. This one works for the 2.6 kernel series.

tags | exploit, shell, kernel, local, root, tcp
SHA-256 | e0a4c6200d855daaf07102fcb5e84b2ce34bf9775307a3c4ea16a0e2bec9460d
revenge_proftpd_ctrls_24.pl.txt
Posted Feb 20, 2007
Authored by Alfredo Pesoli | Site 0xcafebabe.it

ProFTPD versions 1.3.0 and 1.3.0a controls local root exploit that binds a shell to tcp/31337.

tags | exploit, shell, local, root, tcp
SHA-256 | 62ebb6b9d642bc1e0e8688dea06dbc7bbe61c1d6177fa589d23cb7b06aaaac39
Gentoo Linux Security Advisory 200702-2
Posted Feb 14, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200702-02 - A flaw exists in the mod_ctrls module of ProFTPD, normally used to allow FTP server administrators to configure the daemon at runtime. Versions less than 1.3.1_rc1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | e3494f4786d21ba459f57467fc252395dccb62ce7f6364e4e60eb0550b575d8d
Secunia Security Advisory 24163
Posted Feb 14, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for proftpd. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, gentoo
SHA-256 | 734f69ad2f4590980eae16c04ed89d9fe066ee874d3c967e6f2bbaa5921a9059
Debian Linux Security Advisory 1245-1
Posted Jan 13, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1245-1 - Martin Loewer discovered that the proftpd FTP daemon is vulnerable to denial of service if the addon module for Radius authentication is enabled.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2005-4816
SHA-256 | 50fcc58bdb5e7e7fdd77b15acebd5b68c5c089cd4d7cb3553c68bfafab2f21cb
Secunia Security Advisory 23473
Posted Dec 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Trustix has issued an update for proftpd. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 6963f11fc22858d4b9afb2ff54c10c7d6c99320d746e461a7c674fad57f733f3
Mandriva Linux Security Advisory 2006.232
Posted Dec 20, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-232 - Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.

tags | advisory, overflow, arbitrary, local
systems | linux, mandriva
SHA-256 | 19684dc412aa4f5dcaad3be1dbe50d4856d46cea887bc1020314e7baf3c625ab
Secunia Security Advisory 23392
Posted Dec 19, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for proftpd. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, mandriva
SHA-256 | e8e6e2f270ccd05d1fb682994628d53dad25cd7d56a47c39a4380fe23d74aaa8
Core Security Technologies Advisory 2006.1127
Posted Dec 15, 2006
Authored by Core Security Technologies, Alfredo Ortega | Site coresecurity.com

Core Security Technologies Advisory - A locally exploitable stack overflow vulnerability has been found in the mod_ctrls module of ProFTPD server. ProFTPD versions 1.3.0a and 1.3.0 are affected.

tags | advisory, overflow
SHA-256 | d36acaee71f87bea897777e3ff93edf6478e47c07c9a9d32a58514040e1ae1cf
Secunia Security Advisory 23371
Posted Dec 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Alfredo Ortega has reported a vulnerability in the mod_ctrls module for ProFTPD, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | bba0b07949d2ab7e7c5c3848dd07716262ab777a9ddd36a68189897ef79608b2
Secunia Security Advisory 23329
Posted Dec 11, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Trustix has issued an update for gnupg and proftpd. This fixes some vulnerabilities, which potentially can be exploited by malicious users and malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 20aef66918667380e15565fcf7f61a5c627f68a75042f8863545a432935fec11
Debian Linux Security Advisory 1222-2
Posted Dec 6, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1222-2 - Due to technical problems yesterday's proftpd update lacked a build for the amd64 architecture, which is now available. Several remote vulnerabilities have been discovered in the proftpd FTP daemon, which may lead to the execution of arbitrary code or denial of service.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2006-5815, CVE-2006-6170, CVE-2006-6171
SHA-256 | b6cf6ad61f34245ebd9b4e72ef0bee6c823bdb1f06c59ff4c77354091c5374c9
Mandriva Linux Security Advisory 2006.217
Posted Dec 6, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Multiple vulnerabilities exist in ProFTPd versions 1.3.0a and below.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2006-5815, CVE-2006-6170, CVE-2006-6171
SHA-256 | e2171be169bfd780fec771b7e39e63a762c38535f944aa32aed8c1273821ce01
Debian Linux Security Advisory 1222-1
Posted Dec 6, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1222-1 - Several remote vulnerabilities have been discovered in the proftpd FTP daemon, which may lead to the execution of arbitrary code or denial of service.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2006-5815, CVE-2006-6170, CVE-2006-6171
SHA-256 | c12800e6db0918beeb56fcbd6c44c2e32fc8823002ebfbc8af9853095cfdc2b7
Secunia Security Advisory 23174
Posted Dec 6, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for proftpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and by malicious users and malicious people to potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | 668de37665cc2169c77eba151c65aef8e33bdfaa5d7c30d9e974012ae15d5a5c
Secunia Security Advisory 23179
Posted Dec 6, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for proftpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and by malicious users and malicious people to potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | 6a7c3239e0278fa2f6892cb5a25736c446f03524686984f0effbd107d3c919fa
Secunia Security Advisory 23184
Posted Dec 6, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for proftpd. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, mandriva
SHA-256 | d1949ef8a59c39f92d4245a7947981d2d166c0e82b848aaa03192b3dabc62136
Secunia Security Advisory 23207
Posted Dec 6, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for proftpd. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to potentially compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, slackware
SHA-256 | 53e22115636efd8b1c5f0280dba1793433394ad763a124a9ee209d770fca826e
Page 3 of 4
Back1234Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close