cpe:/a:proftpd_project:proftpd:1.3.0 CVE-2006-5815 2006-11-08T18:07:00.000-05:00 2017-07-19T21:34:00.027-04:00 10.0 NETWORK LOW NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2006-11-09T15:15:00.000-05:00 ALLOWS_ADMIN_ACCESS SECTRACK 1017167 TRUSTIX 2006-0066 TRUSTIX 2006-0070 BUGTRAQ 20061127 CVE-2006-5815: remote code execution in ProFTPD BID 20992 SECUNIA 22803 SECUNIA 22821 SECUNIA 23000 SECUNIA 23069 SECUNIA 23125 SECUNIA 23174 SECUNIA 23179 SECUNIA 23184 SECUNIA 23207 VUPEN ADV-2006-4451 DEBIAN DSA-1222 GENTOO GLSA-200611-26 MANDRIVA MDKSA-2006:217 MANDRIVA MDKSA-2006:217-1 OPENPKG OpenPKG-SA-2006.035 SLACKWARE SSA:2006-335-02 CONFIRM http://bugs.proftpd.org/show_bug.cgi?id=2858 CONFIRM https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820 XF proftpd-code-execution(30147) Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."