Threat Encyclopedia



This indicates an attack attempt to exploit a Use After Free Vulnerability in ProFTPD Project ProFTPD.
A remote, authenticated attacker can exploit this vulnerability by interrupting the data transfer. Successful exploitation could allow the attacker to execute arbitrary remote code.

affected-products-logoAffected Products

ProFTPD Project ProFTPD prior to 1.3.7.

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.

CVE References


Telemetry logoTelemetry