Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2019-19383
Disclosure Date: December 03, 2019 (last updated November 27, 2024)
freeFTPd 1.0.8 has a Post-Authentication Buffer Overflow via a crafted SIZE command (this is exploitable even if logging is disabled).
0
Attacker Value
Unknown
CVE-2012-6067
Disclosure Date: December 04, 2012 (last updated October 05, 2023)
freeFTPd.exe in freeFTPd through 1.0.11 allows remote attackers to bypass authentication via a crafted SFTP session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c.
0
Attacker Value
Unknown
CVE-2006-2407
Disclosure Date: May 16, 2006 (last updated October 04, 2023)
Stack-based buffer overflow in (1) WeOnlyDo wodSSHServer ActiveX Component 1.2.7 and 1.3.3 DEMO, as used in other products including (2) FreeSSHd 1.0.9 and (3) freeFTPd 1.0.10, allows remote attackers to execute arbitrary code via a long key exchange algorithm string.
0
Attacker Value
Unknown
CVE-2005-3812
Disclosure Date: November 26, 2005 (last updated February 22, 2025)
freeFTPd 1.0.10 allows remote authenticated users to cause a denial of service (null dereference and crash) via a PORT command with missing arguments.
0
Attacker Value
Unknown
CVE-2005-3683
Disclosure Date: November 19, 2005 (last updated February 22, 2025)
Stack-based buffer overflow in freeFTPd before 1.0.9 with Logging enabled, allows remote attackers to cause a denial of service (application crash), and possibly execute arbitrary code, via a long USER command.
0
Attacker Value
Unknown
CVE-2005-3684
Disclosure Date: November 19, 2005 (last updated February 22, 2025)
Multiple buffer overflows in freeFTPd 1.0.8, without logging enabled, allow remote authenticated attackers to cause a denial of service (application crash), and possibly execute arbitrary code, via long (1) MKD and (2) DELE commands.
0