Vulnerabilities
Vulnerable Software
Freeftpd:  >> Freeftpd  >> 1.0.8  Security Vulnerabilities
A stack-based buffer overflow vulnerability exists in freeFTPd version 1.0.10 and earlier in the handling of the FTP PASS command. When an attacker sends a specially crafted password string, the application fails to validate input length, resulting in memory corruption. This can lead to denial of service or arbitrary code execution. Exploitation requires the anonymous user account to be enabled.
CVSS Score
9.8
EPSS Score
0.59
Published
2025-07-31
freeFTPd 1.0.8 has a Post-Authentication Buffer Overflow via a crafted SIZE command (this is exploitable even if logging is disabled).
CVSS Score
8.8
EPSS Score
0.261
Published
2019-12-03
freeFTPd.exe in freeFTPd through 1.0.11 allows remote attackers to bypass authentication via a crafted SFTP session, as demonstrated by an OpenSSH client with modified versions of ssh.c and sshconnect2.c.
CVSS Score
10.0
EPSS Score
0.01
Published
2012-12-04
Stack-based buffer overflow in freeFTPd before 1.0.9 with Logging enabled, allows remote attackers to cause a denial of service (application crash), and possibly execute arbitrary code, via a long USER command.
CVSS Score
7.5
EPSS Score
0.847
Published
2005-11-19
Multiple buffer overflows in freeFTPd 1.0.8, without logging enabled, allow remote authenticated attackers to cause a denial of service (application crash), and possibly execute arbitrary code, via long (1) MKD and (2) DELE commands.
CVSS Score
7.5
EPSS Score
0.145
Published
2005-11-19


Contact Us

Shodan ® - All rights reserved