Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2020-35359

Disclosure Date: December 26, 2020 (last updated February 22, 2025)
Pure-FTPd 1.0.48 allows remote attackers to prevent legitimate server use by making enough connections to exceed the connection limit.
Attacker Value
Unknown

CVE-2020-9365

Disclosure Date: February 24, 2020 (last updated February 21, 2025)
An issue was discovered in Pure-FTPd 1.0.49. An out-of-bounds (OOB) read has been detected in the pure_strcmp function in utils.c.
Attacker Value
Unknown

CVE-2019-20176

Disclosure Date: December 31, 2019 (last updated November 08, 2023)
In Pure-FTPd 1.0.49, a stack exhaustion issue was discovered in the listdir function in ls.c.
Attacker Value
Unknown

CVE-2017-12170

Disclosure Date: September 21, 2017 (last updated November 26, 2024)
Downstream version 1.0.46-1 of pure-ftpd as shipped in Fedora was vulnerable to packaging error due to which the original configuration was ignored after update and service started running with default configuration. This has security implications because of overriding security-related configuration. This issue doesn't affect upstream version of pure-ftpd.
0
Attacker Value
Unknown

CVE-2011-3171

Disclosure Date: November 04, 2011 (last updated October 04, 2023)
Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors.
0
Attacker Value
Unknown

CVE-2011-0418

Disclosure Date: May 24, 2011 (last updated October 04, 2023)
The glob implementation in Pure-FTPd before 1.0.32, and in libc in NetBSD 5.1, does not properly expand expressions containing curly brackets, which allows remote authenticated users to cause a denial of service (memory consumption) via a crafted FTP STAT command.
0
Attacker Value
Unknown

CVE-2011-1575

Disclosure Date: May 23, 2011 (last updated October 04, 2023)
The STARTTLS implementation in ftp_parser.c in Pure-FTPd before 1.0.30 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted FTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
0