├── LICENSE ├── README.md ├── ftp-vuln.db ├── ftpscan.py ├── requirements.txt └── setup.sh /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2024 Sc17 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | 23 | DISCLAIMER: THIS SOFTWARE IS INTENDED FOR EDUCATIONAL AND LEGAL PURPOSES ONLY. 24 | THE DEVELOPER IS NOT RESPONSIBLE FOR ANY ILLEGAL USE OF THIS SOFTWARE. BY USING 25 | THIS SOFTWARE, YOU AGREE TO USE IT IN COMPLIANCE WITH ALL APPLICABLE LAWS AND 26 | REGULATIONS. 27 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # FTP Scanner for Pentesting and CTFs 2 | ![Screenshot from 2024-07-28 19-53-06](https://github.com/user-attachments/assets/eb855e92-71a9-49fe-a3f2-009d52610df8) 3 | 4 | ![Python](https://img.shields.io/badge/python-v3.8%2B-blue) 5 | ![License](https://img.shields.io/badge/license-MIT-green) 6 | ![Platform](https://img.shields.io/badge/platform-linux--64%20%7C%20windows--64-lightgrey) 7 | ![Status](https://img.shields.io/badge/status-active-brightgreen) 8 | 9 | ## Overview 10 | 11 | Welcome to the **FTP Scanner**, a tool designed for cybersecurity professionals and enthusiasts involved in Capture the Flag (CTF) competitions and pentesting activities. This script helps you identify anonymous FTP logins, lists files, grabs banners, and checks for known vulnerabilities against a database. 12 | 13 | ## Features 14 | 15 | - **Anonymous Login Detection**: Checks if an FTP server allows anonymous logins. 16 | - **File Listing**: Lists all files available in the FTP directory. 17 | - **Banner Grabbing**: Extracts the FTP server banner. 18 | - **Vulnerability Scanning**: Compares the extracted banner against a local database of known vulnerabilities. 19 | 20 | ## Prerequisites 21 | 22 | Make sure you have Python 3.8+ installed. You'll also need to install the required dependencies: 23 | ## Setup 24 | ```sh 25 | git clone https://github.com/MIISTERC/ftp-scan.git 26 | cd ftp-scan 27 | sudo bash setup.sh 28 | ``` 29 | You can use the automated setup file `setup.sh` or you can do it manually.. 30 | ```sh 31 | git clone https://github.com/MIISTERC/ftp-scan.git 32 | cd ftp-scan 33 | pip3 install -r requirements.txt 34 | sudo ln -s /ftp-scan/ftpscan.py /usr/bin/ftpscan 35 | ftpscan -h 36 | ``` 37 | or you can just use it by 38 | ```sh 39 | python3 ftpscan.py -h 40 | ``` 41 | ## Usage 42 | ```sh 43 | ftpscan -t 127.0.0.1 (default port is 21) 44 | ftpscan -t 127.0.0.1 -p 1234 45 | ``` 46 | ## Warning 47 | 1.Make sure the shebang in `ftpscan.py` matches your actual python3 path if it does , then you are good to go :) 48 |
49 | 2.After running setup.sh , please don't move the script to another location as it deflects the symbolic link and as well as the script cant open the `.db` file. instead after cloning leave the `ftp-scan` directory as it is. 50 | ## output 51 | Example output 52 |
53 | ![output](https://github.com/user-attachments/assets/f46cd135-b17e-4bd1-a350-07214efd6291) 54 | 55 | 56 | hope this tools! Help you.. 57 | 58 | -------------------------------------------------------------------------------- /ftp-vuln.db: -------------------------------------------------------------------------------- 1 | 39,"Atftpd 0.6 - Remote Root Exploit (atftpdx.c)" 2 | 43,"ProFTPD 1.2.9RC1 (mod_sql) Remote SQL Injection Exploit" 3 | 54,"LeapFTP 2.7.x - Remote Buffer Overflow Exploit" 4 | 74,"wu-ftpd 2.6.2 off-by-one Remote Root Exploit" 5 | 78,"wu-ftpd 2.6.2 - Remote Root Exploit (advanced version)" 6 | 80,"Oracle XDB FTP Service UNLOCK Buffer Overflow Exploit" 7 | 84,"Gopherd <= 3.0.5 FTP Gateway Remote Overflow Exploit" 8 | 96,"4D WebSTAR FTP Server Suite Remote Buffer Overflow Exploit" 9 | 107,"ProFTPD 1.2.9rc2 ASCII File Remote Root Exploit" 10 | 110,"ProFTPD 1.2.7 - 1.2.9rc2 - Remote Root & brute-force Exploit" 11 | 115,"wu-ftpd 2.6.2 - Remote Denial of Service Exploit (wuftpd-freezer.c)" 12 | 143,"lftp <= 2.6.9 - Remote Stack based Overflow Exploit" 13 | 149,"Serv-U FTPD 3.x/4.x ""SITE CHMOD"" Command Remote Exploit" 14 | 158,"Serv-U FTPD 3.x/4.x/5.x (MDTM) Remote Overflow Exploit" 15 | 159,"WFTPD Server <= 3.21 - Remote Buffer Overflow Exploit" 16 | 165,"WS_FTP Server <= 4.0.2 ALLO Remote Buffer Overflow Exploit" 17 | 201,"wu-ftpd 2.6.0 - Remote Root Exploit" 18 | 204,"BFTPd vsprintf() Format Strings Exploit" 19 | 212,"HP-UX FTPD Remote Buffer Overflow Exploit" 20 | 225,"BFTPd 1.0.12 - Remote Exploit" 21 | 234,"OpenBSD 2.6 / 2.7ftpd Remote Exploit" 22 | 239,"wu-ftpd 2.6.0 - Remote Format Strings Exploit" 23 | 241,"ProFTPD 1.2.0 (rc2) - memory leakage example Exploit" 24 | 244,"ProFTPD <= 1.2.0pre10 - Remote Denial of Service Exploit" 25 | 269,"BeroFTPD 1.3.4(1) - Remote Root Exploit (Linux x86)" 26 | 297,"Sasser Worm ftpd Remote Buffer Overflow Exploit (port 5554)" 27 | 348,"wu-ftpd <= 2.6.1 - Remote Root Exploit" 28 | 356,"OverByte ICS FTP Server Remote Denial of Service Exploit" 29 | 361,"Flash FTP Server Directory Traversal" 30 | 372,"OpenFTPD <= 0.30.2 - Remote Exploit" 31 | 373,"OpenFTPD <= 0.30.1 (message system) Remote Shell Exploit" 32 | 394,"ProFTPd Local pr_ctrls_connect Vulnerability - ftpdctl" 33 | 396,"OpenBSD ftp Exploit (teso)" 34 | 426,"TiTan FTP Server Long Command Heap Overflow PoC Exploit" 35 | 427,"WFTPD Pro Server 3.21 MLST Remote Denial of Service Exploit" 36 | 428,"CesarFTP Server Long Command Denial of Service Exploit" 37 | 439,"BlackJumboDog FTP Server 3.6.1 - Remote Buffer Overflow Exploit" 38 | 476,"glFTPd Local Stack Overflow Exploit (PoC) (Slackware 9.0/9.1/10.0)" 39 | 560,"GlobalSCAPE - CuteFTP macros (.mcr) - Local Vulnerability" 40 | 581,"ProFTPD <= 1.2.10 - Remote Users Enumeration Exploit" 41 | 588,"Ability Server 2.34 - FTP STOR Buffer Overflow" 42 | 601,"libxml 2.6.12 nanoftp Remote Buffer Overflow Proof of Concept Exploit" 43 | 608,"WvTFTPd 0.9 - Remote Root Heap Overflow Exploit" 44 | 611,"chesapeake tftp server 1.0 - Directory Traversal and DoS PoC Exploit" 45 | 4971,"vsftpd 3.0.3 - Remote Denial of Service Exploit" 46 | 618,"Ability Server 2.34 FTP STOR Buffer Overflow Exploit (Unix Exploit)" 47 | 623,"SlimFTPd <= 3.15 - Remote Buffer Overflow Exploit" 48 | 625,"WinFTP Server 1.6 - Denial of Service Exploit" 49 | 650,"CoffeeCup FTP Clients (Direct <= 6.2.0.62) (Free <= 3.0.0.10) BoF Exploit" 50 | 664,"WS_FTP Server <= 5.03 MKD Remote Buffer Overflow Exploit" 51 | 711,"CrystalFTP Pro 2.8 - Remote Buffer Overflow Exploit" 52 | 767,"Golden FTP Server <= 2.02b Remote Buffer Overflow Exploit" 53 | 794,"3CServer 1.1 FTP Server Remote Exploit" 54 | 803,"DelphiTurk FTP 1.0 - Passwords to Local Users Exploit" 55 | 823,"Dream FTP 1.2 - Remote Format String Exploit" 56 | 827,"3Com 3CDaemon FTP Unauthorized ""USER"" Remote BoF Exploit" 57 | 833,"PeerFTP 5 - Local Password Disclosure Exploit" 58 | 842,"wu-ftpd <= 2.6.2 File Globbing Denial of Service Exploit" 59 | 886,"PlatinumFTP <= 1.0.18 - Multiple Remote Denial of Service Exploit" 60 | 893,"Ocean FTP Server 1.00 - Denial of Service Exploit" 61 | 902,"mtftpd <= 0.0.3 - Remote Root Exploit" 62 | 908,"ArGoSoft FTP Server <= 1.4.2.8 - Denial of Service Exploit" 63 | 918,"FTP Now <= 2.6.14 - Local Password Disclosure Exploit" 64 | 955,"NetFTPd 4.2.2 - User Authentication Remote Buffer Overflow Exploit" 65 | 967,"Golden FTP Server Pro 2.52 - Remote Buffer Overflow Exploit" 66 | 968,"Golden FTP Server Pro 2.52 - Remote Buffer Overflow Exploit (2nd)" 67 | 969,"Golden FTP Server Pro 2.52 - Remote Buffer Overflow Exploit (3rd)" 68 | 971,"BulletProof FTP Server 2.4.0.31 - Local Privilege Escalation Exploit" 69 | 975,"GlobalScape Secure FTP Server 3.0 - Buffer Overflow Exploit" 70 | 977,"HP-UX FTPD <= 1.1.214.4 - ""REST"" Remote Brute Force Exploit" 71 | 1027,"FutureSoft TFTP Server 2000 - Remote Denial of Service Exploit" 72 | 1028,"Crob FTP Server <= 3.6.1 - Remote Stack Overflow Exploit" 73 | 1081,"Nokia Affix < 3.2.0 - btftp Remote Client Exploit" 74 | 1118,"SlimFTPd <= 3.16 - Remote Buffer Overflow Exploit" 75 | 1121,"FTPshell Server <= 3.38 - Remote Denial of Service Exploit" 76 | 1129,"Quick 'n EasY <= 3.0 FTP Server Remote Denial of Service Exploit" 77 | 1158,"WS_FTP Server <= 5.03 (RNFR) Buffer Overflow Exploit" 78 | 1160,"Golden FTP Server Pro <= 2.52 (USER) Remote Buffer Overflow Exploit" 79 | 1166,"Inframail Advantage Server Edition 6.0 <= 6.37 - (FTP) BoF Exploit" 80 | 1201,"FTP Internet Access Manager <= 1.2 Command Execution Exploit" 81 | 1218,"Stoney FTPd Denial of Service Exploit (rxBot mods ftpd)" 82 | 1231,"WzdFTPD <= 0.5.4 - Remote Command Execution Exploit" 83 | 1238,"Prozilla <= 1.3.7.4 (ftpsearch) Results Handling Buffer Overflow Exploit" 84 | 1251,"TYPSoft FTP Server <= 1.11 (RETR) Denial of Service Vulnerability" 85 | 1259,"HP-UX FTP Server Preauthentication Directory Listing Exploit (meta)" 86 | 1292,"WzdFTPD <= 0.5.4 (SITE) Remote Command Execution Exploit (meta)" 87 | 1295,"linux-ftpd-ssl 0.17 (MKD/CWD) Remote Root Exploit" 88 | 1330,"FreeFTPD <= 1.0.8 (USER) Remote Buffer Overflow Exploit" 89 | 1339,"FreeFTPD <= 1.0.10 (PORT Command) Denial of Service Exploit" 90 | 1381,"Golden FTP Server <= 1.92 (APPE) Remote Overflow Exploit (meta)" 91 | 1413,"eStara Softphone <= 3.0.1.46 (SIP) Remote Buffer Overflow Exploit" 92 | 1414,"eStara Softphone <= 3.0.1.46 (SIP) Remote Buffer Overflow Exploit (2)" 93 | 1417,"Farmers WIFE 4.4 sp1 (FTP) Remote System Access Exploit" 94 | 1422,"Cerberus FTP Server <= 2.32 - Denial of Service Exploit" 95 | 1424,"Tftpd32 2.81 - (GET Request) Format String Denial of Service PoC" 96 | 1448,"Sami FTP Server 2.0.1 - Remote Stack Based Buffer Overflow PoC" 97 | 1452,"Sami FTP Server 2.0.1 - Remote Buffer Overflow Exploit (meta)" 98 | 1462,"Sami FTP Server 2.0.1 - Remote Buffer Overflow Exploit (cpp)" 99 | 1531,"ArGoSoft FTP Server <= 1.4.3.5 - Remote Buffer Overflow PoC" 100 | 1552,"XM Easy Personal FTP Server 1.0 (Port) Remote Overflow PoC" 101 | 1743,"Golden FTP Server Pro 2.70 (APPE) Remote Buffer Overflow PoC" 102 | 1748,"XM Easy Personal FTP Server <= 4.3 (USER) Remote Buffer Overflow PoC" 103 | 1749,"acFTP FTP Server <= 1.4 (USER) Remote Buffer Overflow PoC" 104 | 1754,"FileCOPA FTP Server <= 1.01 (USER) Remote Pre-Auth DoS" 105 | 1757,"acFTP FTP Server <= 1.4 (USER) Remote Denial of Service Exploit" 106 | 1758,"TinyFTPD <= 1.4 (USER) Remote Buffer Overflow DoS" 107 | 1906,"CesarFTP 0.99g - (MKD) Remote Buffer Overflow Exploit" 108 | 1915,"CesarFTP 0.99g - (MKD) Remote Buffer Overflow Exploit (meta)" 109 | 1949,"XM Easy Personal FTP Server 5.0.1 (Port) Remote Overflow PoC" 110 | 2047,"FileCOPA FTP Server <= 1.01 (LIST) Remote Buffer Overflow Exploit" 111 | 2233,"WFTPD 3.23 (SIZE) Remote Buffer Overflow Exploit" 112 | 2234,"Easy File Sharing FTP Server 2.0 (PASS) Remote Exploit (PoC)" 113 | 2244,"Mozilla Firefox <= 1.5.0.6 (FTP Request) Remote Denial of Service Exploit" 114 | 2334,"Multithreaded TFTP <= 1.1 - (Long Get Request) Denial of Service Exploit" 115 | 2401,"WS_FTP LE 5.08 (PASV response) Remote Buffer Overflow Exploit" 116 | 2530,"BulletProof FTP Client 2.45 - Remote Buffer Overflow Exploit (PoC)" 117 | 2638,"Cisco VPN 3000 Concentrator <= 4.1.7 / 4.7.2 - (FTP) Remote Exploit" 118 | 2715,"XM Easy Personal FTP Server <= 5.2.1 - Remote Denial of Service Exploit" 119 | 2734,"WFTPD Pro Server 3.23.1.1 (APPE) Remote Buffer Overflow PoC" 120 | 2735,"WarFTPd 1.82.00-RC11 - Remote Denial of Service Exploit" 121 | 2787,"UniversalFTP 1.0.50 (MKD) Remote Denial of Service Exploit" 122 | 2854,"AT-TFTP <= 1.9 - (Long Filename) Remote Buffer Overflow PoC" 123 | 2855,"3Com TFTP Service <= 2.0.1 - (Long Transporting Mode) Overflow PoC" 124 | 2856,"ProFTPD 1.3.0 (sreplace) Remote Stack Overflow Exploit (meta)" 125 | 2865,"3Com TFTP Service <= 2.0.1 - (Long Transporting Mode) Overflow Exploit" 126 | 2874,"NetBSD FTPd / tnftpd Remote Stack Overflow PoC" 127 | 2887,"AT-TFTP <= 1.9 - (Long Filename) Remote Buffer Overflow Exploit" 128 | 2901,"Filezilla FTP Server 0.9.20b/0.9.21 (STOR) Denial of Service Exploit" 129 | 2914,"Filezilla FTP Server <= 0.9.21 (LIST/NLST) Denial of Service Exploit" 130 | 2916,"Golden FTP server 1.92 (USER/PASS) Heap Overflow PoC" 131 | 2926,"Crob FTP Server 3.6.1 build 263 (LIST/NLST) Denial of Service Exploit" 132 | 2928,"ProFTPD <= 1.3.0a (mod_ctrls support) Local Buffer Overflow PoC" 133 | 2934,"Sambar FTP Server 6.4 (SIZE) Remote Denial of Service Exploit" 134 | 2936,"GNU InetUtils ftpd 1.4.2 (ld.so.preload) Remote Root Exploit" 135 | 2942,"Star FTP Server 1.10 (RETR) Remote Denial of Service Exploit" 136 | 2961,"Hewlett-Packard FTP Print Server <= 2.4.5 - Buffer Overflow (PoC)" 137 | 2972,"DREAM FTP Server 1.0.2 (PORT) Remote Denial of Service Exploit" 138 | 2978,"XM Easy Personal FTP Server 5.2.1 (USER) Format String DoS Exploit" 139 | 2985,"acFTP FTP Server 1.5 (REST/PBSZ) Remote Denial of Service Exploit" 140 | 3021,"ProFTPD <= 1.2.9 rc2 - (ASCII File) Remote Root Exploit" 141 | 3107,"FileCOPA FTP Server <= 1.01 (LIST) Remote BoF Exploit (meta)" 142 | 3126,"WFTPD Pro Server <= 3.25 SITE ADMN Remote Denial of Service Exploit" 143 | 3127,"Sami FTP Server 2.0.2 (USER/PASS) Remote Buffer Overflow PoC" 144 | 3128,"BolinTech DreamFTP (USER) Remote Buffer Overflow PoC" 145 | 3132,"TFTPDWIN 0.4.2 - Remote Buffer Overflow Exploit" 146 | 3140,"Sami FTP Server 2.0.2 (USER/PASS) Remote Buffer Overflow Exploit" 147 | 3156,"Rumpus 5.1 - Local Privilege Escalation / Remote FTP LIST PoC Exploit" 148 | 3160,"Transmit.app <= 3.5.5 ftps:// URL Handler Heap Buffer Overflow PoC" 149 | 3170,"3Com TFTP Service <= 2.0.1 - Remote Buffer Overflow Exploit (meta)" 150 | 3277,"SmartFTP Client 2.0.1002 - Remote Heap Overflow DoS Exploit" 151 | 3330,"ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit" 152 | 3331,"VicFTPS < 5.0 (CWD) Remote Buffer Overflow Exploit PoC" 153 | 3333,"ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit 2" 154 | 3335,"IPSwitch WS-FTP 5.05 (XMD5) Remote Buffer Overflow Exploit (meta)" 155 | 3341,"TurboFTP 5.30 Build 572 (newline/LIST) Multiple Remote DoS Exploit" 156 | 3343,"FTP Voyager <= 14.0.0.3 (CWD) Remote Stack Overflow Exploit PoC" 157 | 3347,"FTP Explorer 1.0.1 Build 047 (CPU consumption) Remote DoS Exploit" 158 | 3380,"Kiwi CatTools TFTP <= 3.2.8 - Remote Path Traversal Vulnerability" 159 | 3385,"XM Easy Personal FTP Server 5.30 (ABOR) Format String DoS Exploit" 160 | 3388,"3Com TFTP Service <= 2.0.1 - (Long Transporting Mode) Exploit (perl)" 161 | 3415,"Konqueror 3.5.5 (JavaScript Read of FTP Iframe) DoS Exploit" 162 | 3432,"TFTPDWIN Server 0.4.2 - (UDP) Denial of Service Exploit" 163 | 3444,"Microsoft Internet Explorer - (FTP Server Response) DoS Exploit (MS07-016)" 164 | 3461,"TFTP Server 1.3 - Remote Buffer Overflow Denial of Service Exploit" 165 | 3474,"WarFTP 1.65 (USER) Remote Buffer Overflow Exploit (win2k SP4)" 166 | 3482,"WarFTP 1.65 - (USER) Remote Buffer Overflow SEH Overflow Exploit" 167 | 3541,"FutureSoft TFTP Server 2000 - Remote SEH Overwrite Exploit" 168 | 3570,"WarFTP 1.65 (USER) Remote Buffer Overlow Exploit (multiple targets)" 169 | 3579,"Easy File Sharing FTP Server 2.0 (PASS) Remote Exploit (Win2K SP4)" 170 | 3649,"Ipswitch WS_FTP 5.05 Server Manager Local Site Buffer Overflow Exploit" 171 | 3675,"FileCOPA FTP Server <= 1.01 (LIST) Remote Buffer Overflow Exploit (2)" 172 | 3730,"ProFTPD 1.3.0/1.3.0a - (mod_ctrls) Local Overflow Exploit (exec-shield)" 173 | 4058,"Ace-FTP Client 1.24a Remote Buffer Overflow PoC" 174 | 4233,"IBM AIX <= 5.3 sp6 ftp gets() Local Root Exploit" 175 | 4312,"ProFTPD 1.x (module mod_tls) Remote Buffer Overflow Exploit" 176 | 4478,"smbftpd 0.96 SMBDirList-function Remote Format String Exploit" 177 | 4498,"wzdftpd <= 0.8.0 (USER) Remote Denial of Service Exploit" 178 | 4681,"ftp admin 0.1.0 - (LFI/xss/ab) Multiple Vulnerabilities" 179 | 4742,"WFTPD Explorer Pro 1.0 - Remote Heap Overflow PoC" 180 | 4828,"AGENCY4NET WEBFTP 1 download2.php File Disclosure Vulnerability" 181 | 5028,"Chilkat FTP ActiveX 2.0 (ChilkatCert.dll) Insecure Method Exploit" 182 | 5036,"Titan FTP Server 6.03 (USER/PASS) Remote Heap Overflow PoC" 183 | 5044,"IpSwitch WS_FTP Server with SSH 6.1.0.0 - Remote Buffer Overflow PoC" 184 | 5210,"Galaxy FTP Server 1.0 (Neostrada Livebox DSL Router) DoS Exploit" 185 | 5270,"Home FTP Server 1.4.5 - Remote Denial of Service Exploit" 186 | 5314,"TFTP Server for Windows 1.4 - ST Buffer Overflow Exploit (0day)" 187 | 5315,"Quick TFTP Pro 2.1 - Remote SEH Overflow Exploit (0day)" 188 | 5316,"PacketTrap Networks pt360 2.0.39 TFTPD - Remote DoS Exploit" 189 | 5438,"XM Easy Personal FTP Server 5.4.0 (XCWD) Denial of Service Exploit" 190 | 5563,"TFTP Server for Windows 1.4 - ST Remote BSS Overflow Exploit" 191 | 5814,"vsftpd 2.0.5 (CWD) Remote Memory Consumption Exploit (post auth)" 192 | 6155,"Cisco IOS 12.3(18) FTP Server - Remote Exploit (attached to gdb)" 193 | 6240,"FlashGet 1.9 - (FTP PWD Response) Remote BoF Exploit PoC (0day)" 194 | 6248,"FlashGet 1.9.0.1012 (FTP PWD Response) SEH STACK Overflow Exploit" 195 | 6256,"FlashGet 1.9.0.1012 (FTP PWD Response) BoF Exploit (safeseh)" 196 | 6257,"WS_FTP Home/Professional FTP Client Remote Format String PoC" 197 | 6458,"The Personal FTP Server 6.0f RETR Denial of Service Exploit" 198 | 6481,"Femitter FTP Server 1.03 (RETR) Remote Denial of Service Exploit PoC" 199 | 6581,"WinFTP Server 2.3.0 (NLST) Denial of Service Exploit" 200 | 6661,"Serv-U <= 7.3 - Remote FTP File Replacement Vulnerability (auth)" 201 | 6717,"WinFTP 2.3.0 (PASV mode) Remote Denial of Service Exploit" 202 | 6738,"GuildFTPd 0.999.8.11/0.999.14 Heap Corruption PoC/DoS Exploit" 203 | 6741,"XM Easy Personal FTP Server 5.6.0 - Remote Denial of Service Exploit" 204 | 6742,"RaidenFTPD 2.4 build 3620 - Remote Denial of Service Exploit" 205 | 6752,"Eserv 3.x FTP Server (ABOR) Remote Stack Overflow PoC" 206 | 6753,"Titan FTP server 6.26 build 630 - Remote Denial of Service Exploit" 207 | 6793,"Dart Communications PowerTCP FTP module Remote BoF Exploit" 208 | 6800,"freeSSHd 1.2.1 sftp rename Remote Buffer Overflow PoC (auth)" 209 | 6812,"freeSSHd 1.2.1 sftp realpath Remote Buffer Overflow PoC (auth)" 210 | 6834,"vicFTP 5.0 (LIST) Remote Denial of Service Exploit" 211 | 6838,"PumpKIN TFTP Server 2.7.2.0 - Denial of Service Exploit (meta)" 212 | 6840,"PowerTCP FTP module Multiple Technique Exploit (SEH/HeapSpray)" 213 | 6863,"PacketTrap TFTPD 2.2.5459.0 - Remote Denial of Service Exploit" 214 | 6926,"FTP Now 2.6 Server Response Remote Crash PoC" 215 | 7214,"ftpzik (xss/lfi) Multiple Vulnerabilities" 216 | 7355,"NULL FTP Server 1.1.0.7 SITE Parameters Command Injection Vuln" 217 | 7452,"ProSysInfo TFTP server TFTPDWIN <= 0.4.2 Univ. Remote BoF Exploit" 218 | 7460,"EvansFTP (EvansFTP.ocx) Remote Buffer Overflow PoC" 219 | 7571,"BulletProof FTP Client 2.63 - Local Heap Overflow PoC" 220 | 7589,"BulletProof FTP Client - (.bps ) Local Stack Overflow PoC" 221 | 7594,"Chilkat FTP ActiveX (SaveLastError) Insecure Method Exploit" 222 | 7756,"Nofeel FTP Server 3.6 (CWD) Remote Memory Consumption Exploit" 223 | 7852,"FTPShell Server 4.3 (licence key) Remote Buffer Overflow PoC" 224 | 7875,"WinFTP 2.3.0 (LIST) Remote Buffer Overflow Exploit (post-auth)" 225 | 7913,"WFTPD Explorer Pro 1.0 - Remote Heap Overflow Exploit" 226 | 8037,"ProFTPd with mod_mysql Authentication Bypass Vulnerability" 227 | 8200,"GuildFTPd FTP Server 0.999.14 - Remote Delete Files Exploit" 228 | 8283,"Femitter FTP Server 1.x - Multiple Vulnerabilities (post auth)" 229 | 8294,"XM Easy Personal FTP Server <= 5.7.0 (NLST) DoS Exploit" 230 | 8384,"net2ftp <= 0.97 - Cross-Site Scripting/Request Forgery Vulnerabilities" 231 | 8398,"ftpdmin 0.96 RNFR Remote Buffer Overflow Exploit (xp sp3/case study)" 232 | 8419,"ftpdmin 0.96 - Arbitrary File Disclosure Exploit" 233 | 8420,"BulletProof FTP Client 2009 - (.bps) Buffer Overflow Exploit (SEH)" 234 | 8504,"NotFTP 1.3.1 - (newlang) Local File Inclusion Vulnerability" 235 | 8518,"Femitter FTP Server 1.03 - Arbitrary File Disclosure Exploit" 236 | 8525,"Dream FTP Server 1.02 (users.dat) Arbitrary File Disclosure Exploit" 237 | 8584,"Addonics NAS Adapter FTP Remote Denial of Service Exploit" 238 | 8611,"32bit FTP (09.04.24) - Banner Remote Buffer Overflow PoC" 239 | 8613,"32bit FTP (09.04.24) - (CWD response) Remote Buffer Overflow Exploit" 240 | 8614,"32bit FTP (09.04.24) - (Banner) Remote Buffer Overflow Exploit" 241 | 8621,"32bit FTP (09.04.24) - (CWD Response) Universal Seh Overwrite Exploit" 242 | 8623,"32bit FTP - (PASV) Reply Client Remote Overflow Exploit (meta)" 243 | 8650,"TYPSoft FTP Server 1.11 (ABORT) Remote DoS Exploit" 244 | 8716,"httpdx <= 0.5b FTP Server (USER) Remote BoF Exploit (SEH)" 245 | 8732,"httpdx <= 0.5b FTP Server (CWD) Remote BoF Exploit (SEH)" 246 | 8897,"httpdx <= 0.8 FTP Server Delete/Get/Create Directories/Files Exploit" 247 | 9117,"HTC / Windows Mobile OBEX FTP Service Directory Traversal Vuln" 248 | 9242,"WzdFTPD <= 8.0 - Remote Denial of Service Exploit" 249 | 9264,"stftp <= 1.10 - (PWD Response) Remote Stack Overflow PoC" 250 | 9278,"NcFTPd <= 2.8.5 - Remote Jail Breakout Vulnerability" 251 | 9426,"FTPShell Client 4.1 RC2 Name Session Stack Overflow Exploit" 252 | 9468,"ProSysInfo TFTP Server TFTPDWIN 0.4.2 - Remote BoF Exploit" 253 | 9496,"WAR-FTPD 1.65 (MKD/CD Requests) Denial of Service Vuln" 254 | 9508,"ProFTP 2.9 (welcome message) Remote Buffer Overflow Exploit (meta)" 255 | 9515,"Cerberus FTP 3.0.1 (ALLO) Remote Overflow DoS Exploit (meta)" 256 | 9528,"TFTPUtil GUI 1.3.0 - Remote Denial of Service Exploit" 257 | 9541,"Microsoft IIS 5.0/6.0 FTP Server Remote Stack Overflow Exploit (win2k)" 258 | 9547,"SolarWinds TFTP Server <= 9.2.0.111 - Remote DoS Exploit" 259 | 9559,"Microsoft IIS 5.0 FTP Server Remote Stack Overflow Exploit (win2k sp4)" 260 | 9587,"Microsoft IIS 5.0/6.0 FTP Server (Stack Exhaustion) Denial of Service" 261 | 9607,"Ipswitch WS_FTP 12 Professional Remote Format String PoC" 262 | 9613,"FTPShell Client 4.1 RC2 - Remote Buffer Overflow Exploit (univ)" 263 | 9622,"WarFTPd 1.82.00-RC12 (LIST command) Format String DoS Exploit" 264 | 9664,"FtpXQ FTP Server 3.0 - Remote Denial of Service Exploit (auth)" 265 | 9667,"Cerberus FTP Server 3.0.3 - Remote Denial of Service Exploit" 266 | 9804,"XM Easy Personal FTP Server <= 5.8.0 DoS" 267 | 9811,"Core FTP Server 1.0 build 304 DoS" 268 | 9815,"Core FTP LE 2.1 build 1612 - Local Buffer Overflow PoC" 269 | 9817,"CuteFTP 8.3.3 - 'create new site' Local Buffer Overflow PoC" 270 | 9852,"Home FTP Server 1.10.1.139 - 'SITE INDEX' Command Remote Denial of Service" 271 | 9928,"WebSTAR FTP Server <= 5.3.2 - USER Overflow (OS X)" 272 | 9998,"BulletProof FTP 2.63 b56 Client Malformed '.bps' File Stack Buffer Overflow" 273 | 9999,"Cerberus FTP server 3.0.6 Pre-Auth DoS" 274 | 10044,"ProFTPd 1.3.0 mod_ctrls Local Stack Overflow (opensuse)" 275 | 10073,"XM Easy Personal FTP 5.8 DoS" 276 | 10100,"FTPDMIN 0.96 (LIST) Remote Denial of Service Exploit" 277 | 10104,"XM Easy Personal FTP Server 'APPE' and 'DELE' Command DoS" 278 | 10162,"Home FTP Server 'MKD' Command Directory Traversal Vulnerability" 279 | 10221,"XM Easy Personal FTP Server 5.8.0 - Remote DoS Vulnerability" 280 | 10257,"XM Easy Professional FTP Server 5.8.0 - Denial of Service" 281 | 10258,"Golden FTP Server 4.30 File Deletion Vulnerability" 282 | 10303,"Core FTP Server 1.0 Build 319 - Denial of Service" 283 | 10542,"TFTP Server for Windows 1.4 - Buffer Overflow Remote Exploit (#2)" 284 | 10603,"TFTP Daemon 1.9 - Denial of Service Exploit" 285 | 10821,"WingFTP Server 3.2.4 - CSRF Vulnerability" 286 | 11117,"iOS Udisk FTP Basic Edition - Remote DoS Exploit (0day)" 287 | 11125,"SwiFTP 1.11 - Overflow DoS PoC" 288 | 11131,"TurboFTP Server 1.00.712 - Remote DoS" 289 | 11148,"PonVFTP Bypass and Shell Upload Vulnerability" 290 | 11293,"Vermillion FTP Deamon 1.31 - Remote BoF Exploit" 291 | 11314,"CoreFTP 2.1 b1637 - (password field) Universal BoF Exploit" 292 | 11391,"Open and Compact FTPd 1.2 - Pre-Authentication Crash (PoC)" 293 | 11420,"Open & Compact FTPd 1.2 - Pre-Authentication Remote Exploit" 294 | 11472,"iOS FTP On The Go 2.1.2 - HTTP Remote DoS" 295 | 11520,"iOS iFTPStorage 1.2 - Remote DoS Exploit" 296 | 11539,"Easy FTP Server 1.7.0.2 - CWD Remote BoF" 297 | 11546,"iPhone - FTP Server (WiFi FTP) by SavySoda DoS/PoC" 298 | 11556,"iPhone FTP Server By Zhang Boyang Remote DoS Exploit" 299 | 11608,"iPhone / iTouch FTPDisc 1.0 3 ExploitsInOne Buffer Overflow DoS" 300 | 11668,"Easy FTP Server 1.7.0.2 - CWD Remote BoF (MSF Module)" 301 | 11705,"FreeBSD and OpenBSD 'ftpd' NULL Pointer Dereference Denial of Service Vulnerability" 302 | 11742,"Open & Compact FTPd 1.2 Pre-Authentication Buffer Overflow (meta)" 303 | 11765,"ArGoSoft FTP Server .NET 1.0.2.1 - Directory Traversal Vulnerability" 304 | 11770,"WFTPD 3.3 - Remote REST DoS" 305 | 11809,"eDisplay Personal FTP server 1.0.0 Pre-Authentication DoS (PoC)" 306 | 11810,"eDisplay Personal FTP server 1.0.0 - Multiple Post-Authentication Crash SEH (PoC)" 307 | 11820,"eDisplay Personal FTP server 1.0.0 - Multiple Post-Authentication Stack BOF" 308 | 11877,"eDisplay Personal FTP server 1.0.0 - Multiple Post-Authentication Stack BOF" 309 | 11878,"Cisco TFTP Server 1.1 - DoS" 310 | 11973,"CompleteFTP Server Directory Traversal" 311 | 12110,"CompleteFTP 3.3.0 - Remote Memory Consumption DoS" 312 | 12119,"Windows FTP Server 1.4 - Auth Bypass" 313 | 12152,"Trellian FTP Client PASV BoF Exploit" 314 | 12312,"EasyFTP Server <= 1.7.0.2 CWD Buffer Overflow (Metasploit)" 315 | 12332,"Xftp client 3.0 PWD Remote Exploit" 316 | 12380,"Rumba ftp Client 4.2 PASV BoF (SEH)" 317 | 12482,"TFTPGUI - Long Transport Mode Overflow" 318 | 12498,"VicFTPS 5.0 - Directory Traversal" 319 | 12530,"TFTPGUI 1.4.5 - Long Transport Mode Overflow DoS (Meta)" 320 | 12587,"wftpd server 3.30 - Multiple Vulnerabilities (0day)" 321 | 12603,"SmallFTPD FTP Server 1.0.3 - DELE Command DoS" 322 | 12604,"TYPSoft FTP Server 1.10 - RETR Command DoS" 323 | 12677,"Rumba FTP Client FTPSFtp.dll 4.2.0.0 - OpenSession() Buffer Overflow" 324 | 12683,"Solarwinds 10.4.0.10 - TFTP DoS" 325 | 12762,"FreeBSD 8.0 ftpd off-by one PoC (FreeBSD-SA-10:05)" 326 | 12774,"HomeFTP Server r1.10.3 (build 144) Denial of Service Exploit" 327 | 12834,"XFTP 3.0 Build 0239 Long filename Buffer Overflow" 328 | 12853,"Quick 'n Easy FTP Server Lite 3.1" 329 | 18615,"TypesoftFTP Server 1.1 - Remote DoS (APPE)" 330 | 13958,"Sysax Multi Server (SFTP module) Multiple Commands DoS Vulnerabilities" 331 | 14188,"Cpanel 11.25 - CSRF Add FTP Account Exploit" 332 | 14204,"Esoftpro Online Guestbook Pro Multiple Vulnerabilities" 333 | 14205,"Esoftpro Online Photo Pro Multiple Vulnerabilities" 334 | 14206,"Esoftpro Online Contact Manager Multiple Vulnerabilities" 335 | 14269,"FathFTP 1.7 - ActiveX Buffer Overflow" 336 | 14380,"Power/Personal FTP Server RETR Denial of Service" 337 | 14399,"Easy FTP Server 1.7.0.11 - MKD Command Remote Buffer Overflow Exploit (Post Auth)" 338 | 14400,"Easy FTP Server 1.7.0.11 - LIST Command Remote Buffer Overflow Exploit (Post Auth)" 339 | 14402,"Easy FTP Server 1.7.0.11 - CWD Command Remote Buffer Overflow Exploit (Post Auth)" 340 | 14409,"AIX5l with FTP-Server Remote Root Hash Disclosure Exploit" 341 | 14451,"Easy FTP Server 1.7.0.11 - LIST Command Remote BoF Exploit (Post Auth) - (meta)" 342 | 14452,"Ubuntu 10.04 LTS - Lucid Lynx ftp Client 0.17-19build1 ACCT - Buffer Overflow" 343 | 14456,"IBM AIX 5l FTPd Remote DES Hash Exploit" 344 | 14496,"UPlusFTP Server 1.7.1.01 - HTTP Remote Buffer Overflow (Post Auth)" 345 | 14539,"FathFTP 1.8 (RasIsConnected Method) ActiveX Buffer Overflow (SEH)" 346 | 14551,"FathFTP 1.8 - (DeleteFile Method) ActiveX Buffer Overflow (SEH)" 347 | 14552,"FathFTP 1.8 (EnumFiles Method) ActiveX Buffer Overflow (SEH)" 348 | 14553,"FathFTP 1.8 (FileExists Method) ActiveX Buffer Overflow (SEH)" 349 | 14604,"Easy FTP - BoF Vulnerabilities in NLST & NLST -al & APPE & RETR & SIZE & XCWD Commands" 350 | 14623,"Easy FTP Server 1.7.0.11 - Multiple Commands Remote Buffer Overflow Exploit (Post Auth)" 351 | 14683,"Httpdx 1.5.4 - Multiple Denial of Service Vulnerabilities (http-ftp) PoC" 352 | 14779,"deepin tftp server 1.25 - Directory Traversal Vulnerability" 353 | 14856,"TFTPDWIN 0.4.2 - Directory Traversal Vulnerability" 354 | 14857,"tftp desktop 2.5 - Directory Traversal Vulnerability" 355 | 14928,"Novell Netware - NWFTPD RMD/RNFR/DELE Argument Parsing Buffer Overflow" 356 | 15188,"iOS FileApp < 2.0 - FTP Remote Denial of Service Exploit" 357 | 15215,"Multiple Vendors libc/glob(3) Resource Exhaustion (+0day Remote ftpd-anon)" 358 | 15349,"Home FTP Server 1.11.1.149 - Post-Auth Directory Traversal" 359 | 15357,"Home FTP Server 1.11.1.149 RETR DELE RMD - Remote Directory Traversal Exploit" 360 | 15358,"SmallFTPD 1.0.3 - Remote Directory Traversal Vulnerability" 361 | 15427,"WinTFTP Server Pro 3.1 - Remote Directory Traversal Vulnerability (0day)" 362 | 15437,"Quick Tftp Server Pro 2.1 - Remote Directory Traversal Vulnerability" 363 | 15438,"AT-TFTP Server 1.8 - Remote Directory Traversal Vulnerability" 364 | 15445,"femitter ftp server 1.04 - Directory Traversal Vulnerability" 365 | 15449,"ProFTPD IAC - Remote Root Exploit" 366 | 15450,"filecopa ftp server 6.01 - Directory Traversal" 367 | 15662,"ProFTPD 1.3.3c - Compromised Source Remote Root Trojan" 368 | 15664,"iOS iFTPStorage <= 1.3 - Directory Traversal" 369 | 15674,"TFTPUtil GUI 1.4.5 - DoS (Meta)" 370 | 15689,"Freefloat FTP Server - Buffer Overflow Vulnerability (0day)" 371 | 15705,"GNU inetutils 1.8-1 - FTP Client Heap Overflow" 372 | 15803,"Windows 7 IIS7.5 FTPSVC UNAUTH'D Remote DoS PoC" 373 | 15750,"SolarFTP 2.0 - Multiple Commands Denial of Service Vulnerability" 374 | 15860,"TYPSoft FTP Server (v 1.10) RETR CMD Denial of Service" 375 | 15866,"Chilkat Software FTP2 - ActiveX Component Remote Code Execution" 376 | 15986,"Blackmoon FTP 3.1 Build 1735/1736 - DoS" 377 | 16036,"Golden FTP Server 4.70 - PASS Command Buffer Overflow Exploit" 378 | 16101,"FTPGetter 3.58.0.21 - Buffer Overflow (PASV) Exploit" 379 | 16119,"FreeBSD <= 5.4-RELEASE ftpd 6.00LS - sendfile kernel mem-leak Exploit" 380 | 16129,"ProFTPD mod_sftp Integer Overflow DoS PoC" 381 | 16150,"XM Easy Personal FTP Server 5.8.0 (TYPE) Denial of Service" 382 | 16177,"ActFax Server FTP 4.25 Build 0221 (2010-02-11) - Remote BoF (Post Auth)" 383 | 16204,"Solar FTP 2.1 - Denial of Service Exploit" 384 | 16191,"Novell ZenWorks 10 & 11 - TFTPD Remote Code Execution Vulnerability" 385 | 16230,"Victory FTP Server 5.0 - Denial of Service Exploit" 386 | 16259,"home ftp server 1.12 - Directory Traversal" 387 | 16260,"Quick 'n Easy FTP Server 3.2 - Denial of Service" 388 | 16270,"vsftpd 2.3.2 - Denial of Service Vulnerability" 389 | 16311,"wu-ftpd SITE EXEC/INDEX Format String Vulnerability" 390 | 16344,"FutureSoft TFTP Server 2000 - Transfer-Mode Overflow" 391 | 16345,"D-Link TFTP 1.0 - Long Filename Buffer Overflow" 392 | 16346,"TFTPDWIN 0.4.2 - Long Filename Buffer Overflow" 393 | 16347,"3CTftpSvc TFTP - Long Mode Buffer Overflow" 394 | 16348,"Quick FTP Pro 2.1 Transfer-Mode Overflow" 395 | 16349,"TFTPD32 <= 2.21- Long Filename Buffer Overflow" 396 | 16350,"Allied Telesyn TFTP Server 1.9 - Long Filename Overflow" 397 | 16462,"FreeFTPd 1.0.10 Key Exchange Algorithm String Buffer Overflow" 398 | 16702,"KarjaSoft Sami FTP Server 2.02 - USER Overflow" 399 | 16703,"GlobalSCAPE Secure FTP Server Input Overflow" 400 | 16704,"LeapFTP 3.0.1 - Stack Buffer Overflow" 401 | 16705,"Seagull FTP 3.3 build 409 - Stack Buffer Overflow" 402 | 16706,"War-FTPD 1.65 Password Overflow" 403 | 16707,"freeFTPd 1.0 Username Overflow" 404 | 16708,"LeapWare LeapFTP 2.7.3.600 - PASV Reply Client Overflow" 405 | 16709,"ProFTP 2.9 Banner Remote Buffer Overflow Exploit" 406 | 16710,"Trellian FTP Client 3.01 PASV Remote Buffer Overflow" 407 | 16711,"EasyFTP Server <= 1.7.0.11 MKD Command Stack Buffer Overflow" 408 | 16712,"BolinTech Dream FTP Server 1.02 Format String" 409 | 16713,"Cesar FTP 0.99g MKD Command Buffer Overflow" 410 | 16714,"Oracle 9i XDB FTP UNLOCK Overflow (Win32)" 411 | 16715,"Serv-U FTPD MDTM Overflow" 412 | 16716,"Odin Secure FTP 4.1 - Stack Buffer Overflow (LIST)" 413 | 16717,"Ipswitch WS_FTP Server 5.05 - XMD5 Overflow" 414 | 16718,"Xlink FTP Server Buffer Overflow" 415 | 16719,"WS-FTP Server 5.03 MKD Overflow" 416 | 16720,"FTP Synchronizer Professional 4.0.73.274 - Stack Buffer Overflow" 417 | 16722,"Xlink FTP Client Buffer Overflow" 418 | 16723,"Vermillion FTP Daemon PORT Command Memory Corruption" 419 | 16724,"War-FTPD 1.65 Username Overflow" 420 | 16725,"FTPGetter Standard 3.55.0.05 - Stack Buffer Overflow (PWD)" 421 | 16726,"FTPPad 1.2.0 - Stack Buffer Overflow" 422 | 16727,"Sasser Worm avserve FTP PORT Buffer Overflow" 423 | 16728,"Gekko Manager FTP Client Stack Buffer Overflow" 424 | 16729,"SlimFTPd LIST Concatenation Overflow" 425 | 16730,"3Com 3CDaemon 2.0 FTP Username Overflow" 426 | 16731,"Oracle 9i XDB FTP PASS Overflow (Win32)" 427 | 16733,"FileCopa FTP Server pre 18 Jul Version" 428 | 16734,"EasyFTP Server <= 1.7.0.11 LIST Command Stack Buffer Overflow" 429 | 16735,"NetTerm NetFTPD - USER Buffer Overflow" 430 | 16736,"FTPShell 5.1 - Stack Buffer Overflow" 431 | 16737,"EasyFTP Server <= 1.7.0.11 CWD Command Stack Buffer Overflow" 432 | 16739,"Xftp FTP Client 3.0 PWD Remote Buffer Overflow Exploit" 433 | 16740,"Microsoft IIS FTP Server NLST Response Overflow" 434 | 16741,"Texas Imperial Software WFTPD 3.23 SIZE Overflow" 435 | 16742,"Easy File Sharing FTP Server 2.0 PASS Overflow" 436 | 16743,"32bit FTP Client - Stack Buffer Overflow" 437 | 16771,"EasyFTP Server <= 1.7.0.11 list.html path Stack Buffer Overflow" 438 | 16851,"ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (Linux)" 439 | 16852,"ProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux)" 440 | 16872,"WebSTAR FTP Server USER Overflow" 441 | 16878,"ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (FreeBSD)" 442 | 16921,"ProFTPD-1.3.3c Backdoor Command Execution" 443 | 17020,"Novell Netware NWFTPD.NLM DELE Remote Code Execution Vulnerability" 444 | 17021,"SpoonFTP 1.2 - RETR Denial of Service Vulnerability" 445 | 17045,"Avaya IP Office Manager 8.1 TFTP - DoS" 446 | 17351,"iPhone4 FTP Server 1.0 - Empty CWD-RETR Remote Crash" 447 | 17355,"GoldenFTP 4.70 PASS Stack Buffer Overflow" 448 | 18716,"BulletProof FTP Client 2010 - Buffer Overflow Vulnerability" 449 | 17373,"ActFax Server FTP Remote BoF (post auth) Bigger Buffer" 450 | 17455,"Smallftpd 1.0.3 FTP Server Denial of Service Vulnerability" 451 | 17476,"Microsoft IIS FTP Server <= 7.0 - Stack Exhaustion DoS (MS09-053)" 452 | 17491,"VSFTPD 2.3.4 - Backdoor Command Execution" 453 | 17498,"Freefloat FTP Server Buffer Overflow Vulnerability (MSF)" 454 | 17507,"Avaya IP Office Manager TFTP Server 8.1 - Directory Traversal Vulnerability" 455 | 17519,"Freefloat FTP Server (LIST command) Buffer Overflow Exploit" 456 | 17527,"Solar FTP 2.1.1 PASV Buffer Overflow PoC" 457 | 17539,"FreeFloat FTP Server 1.00 - MKD Buffer Overflow Exploit" 458 | 17540,"Freefloat FTP Server MKD Buffer Overflow (MSF)" 459 | 17546,"FreeFloat FTP Server 1.0 - REST & PASV Buffer Overflow Exploit" 460 | 17548,"FreeFloat FTP Server REST Buffer Overflow (MSF)" 461 | 17550,"FreeFloat FTP Server 1.0 - ACCL Buffer Overflow Exploit" 462 | 17569,"Ciscokits 1.0 - TFTP Server File Name DoS" 463 | 17584,"cFTP <= 0.1 (r80) Arbitrary File Upload" 464 | 17588,"Actfax FTP Server <= 4.27 - USER Command Stack Buffer Overflow (MSF) (0day)" 465 | 17618,"CiscoKits 1.0 - TFTP Server DoS (Write command)" 466 | 17619,"CiscoKits 1.0 - TFTP Server Directory Traversal Vulnerability" 467 | 17649,"BisonFTP Server <= 3.5 - Remote Buffer Overflow Exploit" 468 | 17676,"Notepad++ NppFTP plugin LIST command Remote Heap Overflow PoC" 469 | 17692,"Solarftp 2.1.2 - PASV Buffer Overflow Exploit (MSF)" 470 | 17742,"Mini FTP Server 1.1 - Buffer Corruption Remote Denial of Service" 471 | 17795,"Crush FTP 5 - 'APPE' command Remote JVM BSOD PoC Exploit" 472 | 17806,"Ubuntu <= 11.04 ftp client Local Buffer Overflow Crash PoC" 473 | 17810,"BisonFTP Server <= 3.5 - Remote Buffer Overflow Exploit (MSF)" 474 | 17819,"KnFTP Server Buffer Overflow Exploit" 475 | 17856,"KnFTP 1.0.0 Server Multiple Buffer Overflow Exploit (DoS PoC)" 476 | 17870,"KnFTP 1.0.0 Server - 'USER' command Remote Buffer Overflow Exploit" 477 | 17876,"ScriptFTP <= 3.3 - Remote Buffer Overflow (LIST)" 478 | 17886,"FreeFloat FTP Server Buffer Overflow Exploit (DEP Bypass)" 479 | 17904,"ScriptFTP 3.3 - Remote Buffer Overflow (MSF)" 480 | 17948,"ScriptFTP <= 3.3 - Remote Buffer Overflow (LIST)" 481 | 18028,"zFTP Server ""cwd/stat"" Remote Denial-of-Service" 482 | 18089,"KnFTP 1.0 - Buffer Overflow Exploit - DEP Bypass" 483 | 18102,"AbsoluteFTP 1.9.6 - 2.2.10 - Remote Buffer Overflow (LIST)" 484 | 18119,"Attachmate Reflection FTP Client Heap Overflow" 485 | 18112,"optima apiftp server <= 1.5.2.13 - Multiple Vulnerabilities" 486 | 18181,"FreeBSD ftpd and ProFTPd on FreeBSD - Remote Root Exploit" 487 | 18182,"Serv-U FTP Jail Break" 488 | 18188,"Hillstone Software HS TFTP Server 1.3.2 - Denial of Service Vulnerability" 489 | 18189,"Ipswitch TFTP Server 1.0.0.24 - Directory Traversal Vulnerability" 490 | 18190,"Serv-U FTP Server < 4.2 - Buffer Overflow" 491 | 18235,"zFTPServer Suite 6.0.0.52 - 'rmdir' Directory Traversal" 492 | 19024,"ComSndFTP Server 1.3.7 Beta Remote Format String Overflow" 493 | 18345,"TFTP Server 1.4 - ST (RRQ) Buffer Overflow Exploit" 494 | 18469,"Typsoft FTP Server 1.10 - Multiple Commands DoS" 495 | 18534,"Sysax Multi Server 5.53 SFTP Post Auth SEH Exploit" 496 | 18628,"PeerFTP Server <= 4.01 - Remote Crash PoC" 497 | 18630,"Android FTPServer 1.9.0 - Remote DoS" 498 | 18643,"Ricoh DC Software DL-10 FTP Server (SR10.exe) <= 1.1.0.6 - Remote Buffer Overflow Vulnerability" 499 | 18658,"Ricoh DC DL-10 SR10 FTP USER Command Buffer Overflow""" 500 | 18671,"KnFTPd 1.0.0 - 'FEAT' DoS PoC-Exploit" 501 | 18718,"distinct tftp server <= 3.01 - Directory Traversal Vulnerability" 502 | 18759,"TFTP Server for Windows 1.4 - ST WRQ Buffer Overflow" 503 | 18866,"Distinct TFTP 3.01 - Writable Directory Traversal Execution" 504 | 18946,"Tftpd32 DNS Server 4.00 - Denial of Service" 505 | 19086,"wu-ftpd 2.4.2 & SCO Open Server <= 5.0.5 & ProFTPD 1.2 pre1 - realpath Vulnerability (1)" 506 | 19087,"wu-ftpd 2.4.2 & SCO Open Server <= 5.0.5 & ProFTPD 1.2 pre1 - realpath Vulnerability (2)" 507 | 19131,"XM Easy Personal FTP Server <= 5.30 - Remote Format String Write4 Exploit" 508 | 19167,"Ipswitch IMail 5.0_WS_FTP Server 1.0.1/1.0.2 Server Privilege Escalation Vulnerability" 509 | 19177,"ComSndFTP 1.3.7 Beta - USER Format String (Write4) Vulnerability" 510 | 19219,"bisonware bisonware ftp server 3.5 - Multiple Vulnerabilities" 511 | 19328,"Qutecom Softphone 2.2.1 Heap Overflow DoS/Crash Proof of Concept" 512 | 19448,"ToxSoft NextFTP 1.82 - Buffer Overflow Vulnerability" 513 | 19473,"Microsoft Internet Explorer 5.0 FTP Password Storage Vulnerability" 514 | 19475,"ProFTPD 1.2 pre1/pre2/pre3/pre4/pre5 - Remote Buffer Overflow (1)" 515 | 19476,"ProFTPD 1.2 pre1/pre2/pre3/pre4/pre5 - Remote Buffer Overflow (2)" 516 | 19503,"ProFTPD 1.2 pre6 snprintf Vulnerability" 517 | 19532,"IBM AIX <= 4.3.2 ftpd Remote Buffer Overflow" 518 | 19560,"Washington University wu-ftpd 2.5.0 - message Buffer Overflow Vulnerability" 519 | 19569,"WFTPD 2.34/2.40/3.0 - Remote Buffer Overflow Vulnerability (1)" 520 | 19570,"WFTPD 2.34/2.40/3.0 - Remote Buffer Overflow Vulnerability (2)" 521 | 19611,"TransSoft Broker FTP Server 3.0 x/4.0 User Name Buffer Overflow Vulnerability" 522 | 19619,"QPC Software QVT Term 4.3/QVT/Net 4.3 Suite FTP Server DoS Vulnerability" 523 | 19624,"Gene6 G6 FTP Server 2.0 - Buffer Overflow DoS Vulnerability" 524 | 19707,"Ascend CascadeView/UX 1.0 tftpd - Symbolic Link Vulnerability" 525 | 19737,"H. Nomura Tiny FTPDaemon 0.52 - Multiple Buffer Overflow Vulnerabilities" 526 | 19740,"Jgaa WarFTPd 1.66 x4s/1.67-3 - (CWD/MKD) DoS Vulnerability" 527 | 19762,"FTPx FTP Explorer 1.0.00.10 - Weak Password Encryption Vulnerability" 528 | 20008,"3R Soft MailStudio 2000 2.0 - Arbitrary File Access" 529 | 20030,"wu-ftpd 2.4.2/2.5 .0/2.6.0 - Remote Format String Stack Overwrite (1)" 530 | 20031,"wu-ftpd 2.4.2/2.5 .0/2.6.0 - Remote Format String Stack Overwrite (2)" 531 | 20032,"wu-ftpd 2.4.2/2.5 .0/2.6.0 - Remote Format String Stack Overwrite (3)" 532 | 20046,"Netscape Professional Services FTP Server (LDAP Aware) 1.3.6 FTP Server Vulnerability" 533 | 20065,"DrPhibez and Nitro187 Guild FTPD 0.9.7 File Existence Disclosure Vulnerability" 534 | 20069,"Texas Imperial Software WFTPD 2.4.1 RNTO Denial of Service Vulnerability" 535 | 20090,"HP JetDirect J3111A Invalid FTP Command DoS Vulnerability" 536 | 20100,"WFTPD 2.4.1RC11 STAT/LIST Command DoS" 537 | 20101,"WFTPD 2.4.1RC11 REST Command Malformed File Write DoS" 538 | 20102,"WFTPD 2.4.1RC11 Unauthenticated MLST Command Remote DoS" 539 | 20228,"TYPSoft 0.7 x FTP Server Remote DoS Vulnerability" 540 | 20334,"CatSoft FTP Serv-U 2.5.x Brute-Force Vulnerability" 541 | 20369,"Cisco PIX Firewall 5.2 PASV Mode FTP Internal Address Disclosure Vulnerability" 542 | 20392,"NetDecision 4.2 - TFTP Writable Directory Traversal Execution" 543 | 20461,"Serv-U 2.4/2.5 FTP Directory Traversal Vulnerability" 544 | 20479,"Pure-FTPd 1.0.21 (CentOS 6.2 & Ubuntu 8.04) - Crash PoC (Null Pointer Dereference)" 545 | 20512,"BSD ftpd 0.3.2 Single Byte Buffer Overflow Vulnerability" 546 | 20536,"ProFTPD 1.2 SIZE Remote Denial of Service Vulnerability" 547 | 20563,"wu-ftpd 2.4.2/2.5 .0/2.6.0/2.6.1/2.6.2 - FTP Conversion Vulnerability" 548 | 20584,"fastream ftp++ 2.0 - Directory Traversal Vulnerability" 549 | 20594,"Wu-Ftpd 2.4.2/2.5/2.6 Debug Mode Client Hostname Format String Vulnerability" 550 | 20651,"datawizards ftpxq 2.0.93 - Directory Traversal Vulnerability" 551 | 20653,"SunFTP 1.0 Build 9 Unauthorized File Access Vulnerability" 552 | 20659,"Netwin SurgeFTP 1.0 b Malformed Request Denial of Service Vulnerability" 553 | 20661,"jarle aase war ftpd 1.67 b04 - Directory Traversal Vulnerability" 554 | 20663,"whitsoft slimserve ftpd 1.0/2.0 - Directory Traversal Vulnerability" 555 | 20690,"wu-ftpd 2.4/2.5/2.6_Trolltech ftpd 1.2_ProFTPD 1.2_BeroFTPD 1.3.4 FTP glob Expansion Vulnerability" 556 | 20691,"FTPFS 0.1.1/0.2.1/0.2.2 mount Buffer Overflow Vulnerability" 557 | 20723,"Gene6 BPFTP FTP Server 2.0 User Credentials Disclosure Vulnerability" 558 | 20726,"Gene6 BPFTP Server 2.0 File Existence Disclosure Vulnerability" 559 | 20731,"FreeBSD 2.2-4.2_NetBSD 1.2-4.5_OpenBSD 2.x ftpd glob() Buffer Overflow" 560 | 20732,"freebsd 4.2-stable ftpd glob() Buffer Overflow Vulnerabilities" 561 | 20733,"OpenBSD 2.x-2.8 ftpd glob() Buffer Overflow" 562 | 20745,"Solaris 2.6/7.0 IN.FTPD CWD Username Enumeration Vulnerability" 563 | 20764,"Solaris 2.6 FTP Core Dump Shadow Password Recovery Vulnerability" 564 | 20765,"Linux kernel 2.4 IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion" 565 | 20794,"WFTPD 3.0 - 'RETR' and 'CWD' Buffer Overflow Vulnerability" 566 | 20803,"raidenftpd 2.1 - Directory Traversal Vulnerability" 567 | 20819,"BRS WebWeaver 0.x FTP Root Path Disclosure Vulnerability" 568 | 20845,"Maxum Rumpus FTP Server 1.3.2/1.3.4/2.0.3 dev Remote DoS" 569 | 20846,"Microsoft IIS 4.0/5.0 FTP Denial of Service Vulnerability" 570 | 20884,"ACLogic CesarFTP 0.98b - Directory Traversal Vulnerability" 571 | 20910,"TransSoft Broker FTP Server 3.0/4.0/4.7/5.x CWD Buffer Overflow Vulnerability" 572 | 20922,"Rumpus FTP Server 1.3.x/2.0.3 - Stack Overflow DoS Vulnerability" 573 | 20946,"Cerberus FTP Server 1.x - Buffer Overflow DoS Vulnerability" 574 | 20957,"WarFTP Daemon 1.82 RC 11 - Remote Format String Vulnerability" 575 | 21009,"ArGoSoft FTP Server 1.2.2.2 - Weak Password Encryption Vulnerability" 576 | 21020,"NetWin DMail 2.x_SurgeFTP 1.0/2.0 Weak Password Encryption Vulnerability" 577 | 21036,"WS-FTP 2.0 Anonymous Multiple FTP Command Buffer Overflow Vulnerability" 578 | 21074,"glFTPD 1.x LIST Denial of Service Vulnerability" 579 | 21090,"CuteFTP 4.2 Default Weak Password Encoding Vulnerability" 580 | 21091,"UltraEdit 8.2 FTP Client Weak Password Encryption Vulnerability" 581 | 21109,"EFTP 2.0.7 337 - Buffer Overflow Code Execution and Denial of Service Vulnerability" 582 | 21110,"EFTP Server 2.0.7.337 - Directory and File Existence Vulnerability" 583 | 21142,"Ipswitch WS_FTP Server 1.0.x/2.0.x - 'STAT' Buffer Overflow Vulnerability" 584 | 21162,"Cooolsoft PowerFTP Server 2.0 3/2.10 - Multiple Denial of Service Vulnerability (1)" 585 | 21163,"Cooolsoft PowerFTP Server 2.0 3/2.10 - Multiple Denial of Service Vulnerability (2)" 586 | 21201,"BrowseFTP Client 1.62 - Buffer Overflow Vulnerability" 587 | 21297,"Squid 2.0-4 Cache FTP Proxy URL Buffer Overflow Vulnerability" 588 | 21305,"Galacticomm Worldgroup 3.20 - Remote FTP Denial of Service Vulnerability" 589 | 21410,"Matu FTP 1.74 Client Buffer Overflow Vulnerability" 590 | 21468,"Matu FTP Server 1.13 Buffer Overflow Vulnerability" 591 | 21515,"Microsoft Internet Explorer 5/6 FTP Web View Cross-Site Scripting Vulnerability" 592 | 21655,"Cisco IOS 11.x - TFTP Server Long File Name Buffer Overflow Vulnerability" 593 | 21681,"Opera 6.0.x FTP View Cross-Site Scripting Vulnerability" 594 | 21682,"Mozilla 1.0/1.1 FTP View Cross-Site Scripting Vulnerability" 595 | 21907,"Cooolsoft PowerFTP Server 2.x - Remote Denial of Service Vulnerability (1)" 596 | 21908,"Cooolsoft PowerFTP Server 2.x - Remote Denial of Service Vulnerability (2)" 597 | 21909,"Cooolsoft PowerFTP Server 2.x - Remote Denial of Service Vulnerability (3)" 598 | 21963,"SolarWinds TFTP Server Standard Edition 5.0.55 - Large UDP Packet Vulnerability" 599 | 21964,"Solarwinds TFTP Server Standard Edition 5.0.55 - Directory Traversal Vulnerability" 600 | 22024,"TFTPD32 2.50 - Arbitrary File Download/Upload Vulnerability" 601 | 22025,"TFTPD32 2.50 - Long Filename Buffer Overflow Vulnerability" 602 | 22032,"acFTP 1.4 Invalid Password Weak Authentication Vulnerability" 603 | 22060,"3Com SuperStack 3 NBX 4.0/4.1 FTPD Denial of Service Vulnerability" 604 | 22079,"ProFTPD 1.2.x STAT Command Denial of Service Vulnerability" 605 | 22081,"Mollensoft Software Enceladus Server Suite 3.9 FTP Command Buffer Overflow" 606 | 22112,"PlatinumFTPServer 1.0.6 Information Disclosure Vulnerability" 607 | 22113,"PlatinumFTPServer 1.0.6 - Arbitrary File Deletion Vulnerability" 608 | 22121,"EType EServ 2.9x FTP Remote Denial of Service Vulnerability" 609 | 22136,"PlatinumFTPServer 1.0.6 Dot-Dot-Slash Directory Traversal Vulnerability" 610 | 22144,"Xynph FTP Server 1.0 Relative Path Directory Traversal Vulnerability" 611 | 22161,"Turbo FTP Server 1.30.823 PORT Overflow" 612 | 22184,"GlobalScape CuteFTP 5.0 LIST Response Buffer Overflow Vulnerability" 613 | 22220,"ByteCatcher FTP Client 1.0.4 Long Server Banner Buffer Overflow Vulnerability" 614 | 22221,"Electrasoft 32Bit FTP 9.49.1 - Client Long Server Banner Buffer Overflow Vulnerability" 615 | 22278,"moxftp 2.2 Banner Parsing Buffer Overflow Vulnerability" 616 | 22351,"Freefloat FTP Server PUT Command Buffer Overflow" 617 | 22465,"Sysax FTP Automation Server 5.33 - Local Privilege Escalation" 618 | 22504,"Cerberus FTP Server 2.1 Information Disclosure Weakness" 619 | 22551,"3D-FTP Client 4.0 - Buffer Overflow Vulnerability" 620 | 22596,"Verilink NetEngine 6100-4 Broadband Router - TFTP Packet Remote Denial of Service Vulnerability" 621 | 22637,"Prishtina FTP Client 1.x - Remote Denial of Service Vulnerability" 622 | 22691,"pablo software solutions baby ftp server 1.2 - Directory Traversal Vulnerability" 623 | 22706,"Crob FTP Server 2.50.4 - Remote Username Format String Vulnerability" 624 | 22721,"Pablo Software Solutions FTP Service 1.2 Anonymous Users Privileges Vulnerability" 625 | 22722,"Pablo Software Solutions FTP Service 1.2 Plaintext Password Weakness" 626 | 22728,"Microsoft Internet Explorer 5 Classic Mode FTP Client Cross Domain Scripting Vulnerability" 627 | 22733,"HP-UX FTPD 1.1.214.4 - REST Command Memory Disclosure Vulnerability" 628 | 22768,"ATFTP 0.7 - Timeout Command Line Argument Local Buffer Overflow Vulnerability" 629 | 22788,"CesarFTP 0.99 g Remote Username Buffer Overrun Vulnerability" 630 | 22789,"CesarFTP 0.99 g Remote CWD Denial of Service Vulnerability" 631 | 22790,"GuildFTPD 0.999.8 CWD Command Denial of Service Vulnerability" 632 | 22796,"MidHosting FTP Daemon 1.0.1 Shared Memory Local Denial of Service Vulnerability" 633 | 22871,"IglooFTP PRO 3.8 - Multiple Buffer Overflow Vulnerabilities (1)" 634 | 22872,"IglooFTP PRO 3.8 - Multiple Buffer Overflow Vulnerabilities (2)" 635 | 22890,"cftp 0.12 Banner Parsing Buffer Overflow Vulnerability" 636 | 22891,"IglooFTP 0.6.1 Banner Parsing Buffer Overflow Vulnerability" 637 | 22893,"University of Minnesota Gopherd 2.0.x/2.3/3.0.x FTP Gateway Buffer Overflow Vulnerability" 638 | 22974,"wu-ftpd 2.6.2 realpath() Off-By-One Buffer Overflow Vulnerability" 639 | 22975,"wu-ftpd 2.6.2_ 2.6.0_ 2.6.1 realpath() Off-By-One Buffer Overflow Vulnerability" 640 | 22999,"Meteor FTP Server 1.2/1.5 USER Memory Corruption Vulnerability" 641 | 23042,"Cerberus FTPServer 1.71/2.1/2.32 - Remote Denial of Service Vulnerability" 642 | 23066,"Tellurian TftpdNT 1.8/2.0 - Long Filename Buffer Overrun Vulnerability" 643 | 23079,"FreeFTPD - Remote Authentication Bypass Exploit (0day)" 644 | 23100,"Ipswitch WS_FTP Server 3.4/4.0 FTP Command Buffer Overrun Vulnerabilities" 645 | 23117,"FTP Desktop 3.5 Banner Parsing Buffer Overflow Vulnerability" 646 | 23118,"FTP Desktop 3.5 FTP 331 Server Response Buffer Overflow Vulnerability" 647 | 23121,"Kukol E.V. HTTP & FTP Server Suite 6.2 File Disclosure Vulnerability" 648 | 23166,"Plug And Play Web Server 1.0 002c FTP Service Command Handler Buffer Overflow Vulnerabilities" 649 | 23169,"wzdftpd 0.1 rc5 Login Remote Denial of Service Vulnerability" 650 | 23170,"ProFTPD 1.2.7/1.2.8 ASCII File Transfer Buffer Overrun Vulnerability" 651 | 23226,"FreeFloat FTP Server Arbitrary File Upload" 652 | 23243,"Free Float FTP Server USER Command Buffer Overflow" 653 | 23468,"Xlight FTP Server 1.25/1.41 PASS Command Remote Buffer Overflow Vulnerability" 654 | 23693,"Sami FTP Server 1.1.3 - Library Crafted GET Request Remote DoS" 655 | 23692,"Sami FTP Server 1.1.3 Invalid Command Argument Local DoS" 656 | 23522,"NetWin SurgeFTP Authenticated Admin Command Injection" 657 | 23531,"HD Soft Windows FTP Server 1.5/1.6 Username Format String Vulnerability" 658 | 23539,"Mabry Software FTPServer/X 1.0 Controls Format String Vulnerability" 659 | 23877,"NexGen FTP Server 1.0/2.x - Remote Directory Traversal Vulnerability" 660 | 23591,"RhinoSoft Serv-U FTP Server 3/4 MDTM Command Stack Overflow Vulnerability (1)" 661 | 23592,"RhinoSoft Serv-U FTP Server 3/4 MDTM Command Stack Overflow Vulnerability (2)" 662 | 23601,"Netwin SurgeFTP Remote Command Execution" 663 | 23689,"Crob FTP Server 3.5.2 - Remote Denial of Service Vulnerability" 664 | 23632,"Crob FTP Server 3.5.1 - Remote Information Disclosure Vulnerability" 665 | 23633,"Crob FTP Server 3.5.1 - Denial of Service Vulnerability" 666 | 23654,"XLight FTP Server 1.x Long Directory Request Remote Denial of Service Vulnerability" 667 | 23660,"BolinTech Dream FTP Server 1.0 User Name Format String Vulnerability (1)" 668 | 23661,"BolinTech Dream FTP Server 1.0 User Name Format String Vulnerability (2)" 669 | 23700,"ACLogic CesarFTP 0.99 - Remote Resource Exhaustion Vulnerability" 670 | 23701,"XLight FTP Server 1.52 - Remote Send File Request Denial of Service Vulnerability" 671 | 23708,"RobotFTP Server 1.0/2.0 - Username Buffer Overflow Vulnerability (1)" 672 | 23709,"RobotFTP Server 1.0/2.0 - Username Buffer Overflow Vulnerability (2)" 673 | 23715,"TransSoft Broker FTP Server 6.1 - Denial of Service Vulnerabilities" 674 | 23716,"SmallFTPD 1.0.3 - Remote Denial of Service Vulnerability" 675 | 23731,"TYPSoft FTP Server 1.1 - Remote CPU Consumption Denial of Service Vulnerability" 676 | 23740,"Samhain Labs 1.x HSFTP Remote Format String Vulnerability" 677 | 23750,"RobotFTP Server 1.0/2.0 - Remote Pre-authenticated Command Denial of Service Vulnerability" 678 | 23760,"RhinoSoft Serv-U FTP Server 3/4/5 MDTM Command Time Argument Buffer Overflow Vulnerability (1)" 679 | 23761,"RhinoSoft Serv-U FTP Server 3/4/5 MDTM Command Time Argument Buffer Overflow Vulnerability (2)" 680 | 23762,"RhinoSoft Serv-U FTP Server 3/4/5 MDTM Command Time Argument Buffer Overflow Vulnerability (3)" 681 | 23763,"RhinoSoft Serv-U FTP Server 3/4/5 MDTM Command Time Argument Buffer Overflow Vulnerability (4)" 682 | 23769,"argosoft ftp server 1.0/1.2/1.4 - Multiple Vulnerabilities" 683 | 23839,"GlobalSCAPE Secure FTP Server 2.0 Build 03.11.2004.2 SITE Command Remote Buffer Overflow Vulnerability" 684 | 23842,"WFTPD Server GUI 3.21 - Remote Denial of Service Vulnerability" 685 | 24029,"RhinoSoft Serv-U FTP Server 3.x/4.x/5.0 LIST Parameter Buffer Overflow Vulnerability" 686 | 24080,"Titan FTP Server 3.0 LIST Denial of Service Vulnerability" 687 | 24142,"MollenSoft Lightweight FTP Server 3.6 - Remote Denial of Service Vulnerability" 688 | 24145,"Orenosv HTTP/FTP Server 0.5.9 HTTP GET Denial of Service Vulnerability (1)" 689 | 24146,"Orenosv HTTP/FTP Server 0.5.9 HTTP GET Denial of Service Vulnerability (2)" 690 | 24147,"Orenosv HTTP/FTP Server 0.5.9 HTTP GET Denial of Service Vulnerability (3)" 691 | 24150,"MollenSoft Lightweight FTP Server 3.6 - Remote Buffer Overflow Vulnerability" 692 | 24195,"WinAgents TFTP Server 3.0 - Remote Buffer Overrun Vulnerability" 693 | 24252,"fastream netfile ftp/web server 6.5/6.7 - Directory Traversal Vulnerability" 694 | 24416,"Ipswitch WS_FTP Server 5.0.x CD Command Malformed File Path Remote Denial of Service Vulnerability" 695 | 24450,"FreeBSD 9.1 ftpd Remote Denial of Service" 696 | 24479,"FreeFloat FTP 1.0 Raw Commands Buffer Overflow" 697 | 24557,"Sami FTP Server 2.0.1 LIST Command Buffer Overflow" 698 | 24684,"Yak! Chat Client 2.x FTP Server Directory Traversal Vulnerability" 699 | 24800,"Microsoft Internet Explorer 5.0.1 FTP URI Arbitrary FTP Server Command Execution Vulnerability" 700 | 24801,"KDE FTP KIOSlave URI Arbitrary FTP Server Command Execution Vulnerability" 701 | 24863,"EastFTP 4.6.02 - ActiveX Control (0day)" 702 | 24875,"Sami FTP Server LIST Command Buffer Overflow" 703 | 24944,"FreeFloat FTP 1.0 - DEP Bypass with ROP" 704 | 24952,"AT-TFTP Server 2.0 - Stack Based Buffer Overflow DoS" 705 | 25063,"War FTP Daemon 1.8 - Remote Denial of Service Vulnerability" 706 | 25122,"glFTPD 1.x/2.0 ZIP Plugins Multiple Directory Traversal Vulnerabilities" 707 | 25218,"PlatinumFTPServer 1.0.18 - Multiple Malformed User Name Connection Denial of Service Vulnerability" 708 | 25321,"YepYep MTFTPD 0.2/0.3 - Remote CWD Argument Format String Vulnerability" 709 | 25472,"Serva 32 TFTP 2.1.0 - Buffer Overflow Denial of Service" 710 | 25486,"RaidenFTPD 2.4 Unauthorized File Access Vulnerability" 711 | 25629,"Orenosv HTTP/FTP Server 0.8.1 FTP Commands Remote Buffer Overflow Vulnerability" 712 | 25631,"Orenosv HTTP/FTP Server 0.8.1 CGISSI.EXE Remote Buffer Overflow Vulnerability" 713 | 25911,"BisonFTP 4R1 - Remote Denial of Service Vulnerability" 714 | 25943,"OFTPD 0.3.x User Command Buffer Overflow Vulnerability" 715 | 25964,"PHPsFTPd 0.2/0.4 Inc.Login.PHP Privilege Escalation Vulnerability" 716 | 26010,"Quick TFTP Server 2.2 - Denial of Service" 717 | 26133,"Sami FTP Server 2.0.1 - RETR Denial of Service" 718 | 26194,"LeapFTP Client 2.7.3/2.7.4 LSQ File Remote Buffer Overflow Vulnerability" 719 | 26219,"WhitSoft Development SlimFTPd 3.17 - Remote Denial of Service Vulnerability" 720 | 26220,"FileZilla 2.2.15 FTP Client Hard-Coded Cipher Key Vulnerability" 721 | 26450,"Baby FTP Server 1.24 - Denial of Service" 722 | 26471,"PCMan's FTP Server 2.0.7 - Buffer Overflow Exploit" 723 | 26495,"PCMan's FTP Server 2.0 - Remote Buffer Overflow Exploit" 724 | 26888,"FTP Sprite 1.2.1 iOS - Persistent XSS Vulnerability" 725 | 27007,"PCMan FTP Server 2.0.7 - Remote Exploit (msf)" 726 | 27277,"PCMAN FTP 2.07 PASS Command - Buffer Overflow" 727 | 27376,"FTP OnConnect 1.4.11 iOS - Multiple Vulnerabilities" 728 | 27401,"Open&Compact FTP Server <= 1.2 (Gabriel's FTP Server) - Auth Bypass & Directory Traversal SAM Retrieval Exploit" 729 | 27523,"Sami FTP Server 2.0.1 - MKD Buffer Overflow ASLR Bypass (SEH)" 730 | 27556,"Open-FTPD 1.2 - Arbitrary File Upload" 731 | 27703,"PCMAN FTP 2.07 STOR Command - Buffer Overflow Exploit" 732 | 27735,"PHPWebFTP 2.3 - Multiple Cross-Site Scripting Vulnerabilities" 733 | 27747,"freeFTPd 1.0.10 (PASS Command) - SEH Buffer Overflow" 734 | 28023,"Confixx 3.0/3.1 FTP_index.PHP Cross-Site Scripting Vulnerability" 735 | 28170,"freeFTPd 1.0.10 PASS Command SEH Overflow (msf)" 736 | 28293,"Oracle 10g Alter Session Integer Overflow Vulnerability" 737 | 28328,"PCMAN FTP 2.07 STOR Command - Stack Overflow Exploit (MSF)" 738 | 28681,"freeFTPd PASS Command Buffer Overflow" 739 | 29275,"Netwin SurgeFTP 2.3a1 SurgeFTPMGR.CGI Multiple Input Validation Vulnerabilities" 740 | 29006,"DirectAdmin 1.28/1.29 CMD_FTP_SHOW DOMAIN Parameter XSS" 741 | 29032,"Conxint FTP 2.2.603 - Multiple Directory Traversal Vulnerabilities" 742 | 29036,"Teamtek Universal FTP Server Multiple Commands Remote Denial of Service Vulnerabilities" 743 | 29204,"NetBSD 3.1 Ftpd and Tnftpd Port Remote Buffer Overflow Vulnerability" 744 | 29297,"HP Printer FTP Print Server 2.4.5 List Command Buffer Overflow Vulnerability" 745 | 29301,"Oracle Portal 9.0.2 Calendar.JSP Multiple HTTP Response Splitting Vulnerabilities" 746 | 29305,"FTPRush 1.0.610 - Host Field Local Buffer Overflow Vulnerability" 747 | 29308,"Oracle Portal 9i/10g Container_Tabs.JSP Cross-Site Scripting Vulnerability" 748 | 29473,"Squid Proxy 2.5/2.6 FTP URI Remote Denial of Service Vulnerability" 749 | 29463,"Ipswitch WS_FTP 2007 Professional WSFTPURL.EXE Local Memory Corruption Vulnerability" 750 | 29470,"Oftpd 0.3.7 Unsupported Address Family Remote Denial of Service Vulnerability" 751 | 30026,"TFTP Server TFTPDWin 0.4.2 - Unspecified Directory Traversal Vulnerability" 752 | 29735,"D-Link TFTP 1.0 - Transporting Mode Remote Buffer Overflow Vulnerability" 753 | 29768,"Mozilla FireFox 1.5.x/2.0 - FTP PASV Port-Scanning Vulnerability" 754 | 29769,"Opera 9.x - FTP PASV Port-Scanning Vulnerability" 755 | 29770,"KDE Konqueror 3.x/IOSlave - FTP PASV Port-Scanning Vulnerability" 756 | 29787,"HP Jetdirect FTP Print Server RERT Command Denial of Service Vulnerability" 757 | 30237,"Cisco Unified Communications Manager - TFTP Service" 758 | 30252,"Conti FTP Server 1.0 Large String Denial of Service Vulnerability" 759 | 30400,"IBM AIX 5.2/5.3 FTP Client Local Buffer Overflow Vulnerability" 760 | 30454,"BlueCat Networks Adonis 5.0.2.8 - TFTP Remote Privilege Escalation Vulnerability" 761 | 32399,"Multiple Vendor FTP Server Long Command Handling Security Vulnerability" 762 | 30678,"Nortel Networks UNIStim IP Softphone 2050 RTCP Port Buffer Overflow Vulnerability" 763 | 31105,"Titan FTP Server 6.05 build 550 DELE Command Remote Buffer Overflow Vulnerability" 764 | 31117,"WS_FTP Server 6 /WSFTPSVR/FTPLogServer/LogViewer.asp Authentication Bypass" 765 | 31205,"Sami FTP Server 2.0.x - Multiple Commands Remote Denial Of Service Vulnerabilities" 766 | 31254,"PCMAN FTP 2.07 ABOR Command - Buffer Overflow Exploit" 767 | 31255,"PCMAN FTP 2.07 CWD Command - Buffer Overflow Exploit" 768 | 31302,"SurgeFTP 2.3a2 - 'Content-Length' Parameter NULL Pointer - Denial Of Service Vulnerability" 769 | 31323,"ADI Convergence Galaxy FTP Server Password - Remote Denial of Service Vulnerability" 770 | 31409,"BootManage TFTP Server 1.99 - 'filename' Remote Buffer Overflow Vulnerability" 771 | 31562,"2X ThinClientServer 5.0 sp1-r3497 TFTP Service - Directory Traversal Vulnerability" 772 | 31579,"Titan FTP Server 10.32 Build 1816 - Directory Traversal Vulnerability" 773 | 31591,"LANDesk Management Suite 8.80.1.1 - PXE TFTP Service Directory Traversal Vulnerability" 774 | 31789,"PCMAN FTP 2.07 - Buffer Overflow Exploit" 775 | 31818,"vsftpd FTP Server 2.0.5 - 'deny_file' Option Remote Denial of Service Vulnerability (1)" 776 | 31819,"vsftpd FTP Server 2.0.5 - 'deny_file' Option Remote Denial of Service Vulnerability (2)" 777 | 31887,"ALFTP FTP Client 4.1/5.0 - 'LIST' Command Directory Traversal Vulnerability" 778 | 31920,"Glub Tech Secure FTP 2.5.15 - 'LIST' Command Directory Traversal Vulnerability" 779 | 31921,"3D-FTP 8.01 - 'LIST' and 'MLSD' Directory Traversal Vulnerabilities" 780 | 31936,"UltraEdit 14.00b - FTP/SFTP 'LIST' Command Directory Traversal Vulnerability" 781 | 31941,"WISE-FTP 4.1/5.5.8 FTP Client 'LIST' Command Directory Traversal Vulnerability" 782 | 31942,"Classic FTP 1.02 - 'LIST' Command Directory Traversal Vulnerability" 783 | 31997,"AceFTP 3.80.3 - 'LIST' Command Directory Traversal Vulnerability" 784 | 32256,"Ipswitch <= 8.0 WS_FTP Client Format String Vulnerability" 785 | 32456,"RhinoSoft Serv-U FTP Server 7.2.0.1 - 'rnto' Command Directory Traversal Vulnerability" 786 | 32517,"Mozilla Firefox 3 - ftp:// URL Multiple File Format Handling XSS" 787 | 32518,"Google Chrome 0.2.149 - ftp:// URL Multiple File Format Handling XSS" 788 | 32557,"FTP Drive + HTTP 1.0.4 iOS - Code Execution Vulnerability" 789 | 32661,"Evans FTP 'EvansFTP.ocx' ActiveX Control Multiple Remote Buffer Overflow Vulnerabilities" 790 | 32699,"Google Chrome 1.0.154.36 - FTP Client PASV Port Scan Information Disclosure Vulnerability" 791 | 32755,"WFTPD Pro 3.30 - Multiple Command Remote Denial of Service Vulnerabilities" 792 | 32798,"ProFTPD 1.3 - 'mod_sql' Username SQL Injection Vulnerability" 793 | 32877,"Xlight FTP Server <= 3.2 - 'user' SQL Injection Vulnerability" 794 | 33054,"Cisco Adaptive Security Appliance 8.x Web VPN FTP or CIFS Authentication Form Phishing Vulnerability" 795 | 33348,"TFTPD32 4.5 / TFTPD64 4.5 - DoS PoC" 796 | 33220,"FileCOPA FTP Server 5.01 - 'NOOP' Command Denial Of Service Vulnerability" 797 | 33495,"Core FTP Server 1.2_ build 535_ 32-bit - Crash PoC" 798 | 33538,"Easy File Sharing FTP Server 3.5 - Stack Buffer Overflow" 799 | 33540,"SurgeFTP 2.x - 'surgeftpmgr.cgi' Multiple Cross-Site Scripting Vulnerabilities" 800 | 33713,"Core FTP LE 2.2 - Heap Overflow PoC" 801 | 33708,"FreeBSD <= 8.0 and OpenBSD 4.x - 'ftpd' NULL Pointer Dereference Denial Of Service Vulnerability" 802 | 33994,"PonVFTP Insecure Cookie Authentication Bypass Vulnerability" 803 | 34028,"Sun Solaris 10 - 'in.ftpd' Long Command Handling Security Vulnerability" 804 | 34047,"Home FTP Server 1.10.3 (build 144) Cross-Site Request Forgery Vulnerability" 805 | 34050,"Home FTP Server 1.10.2.143 - Directory Traversal Vulnerability" 806 | 34051,"Core FTP Server 1.0.343 - Directory Traversal Vulnerability" 807 | 34095,"PonVFTP 'login.php' SQL Injection Vulnerability" 808 | 34156,"TurboFTP Server <= 1.20.745 - Directory Traversal Vulnerability" 809 | 34162,"BulletProof FTP Client 2010 - Buffer Overflow (SEH)" 810 | 34305,"Easy FTP Pro 4.2 iOS - Command Injection Vulnerabilities" 811 | 34403,"Quick 'n Easy FTP Server 3.9.1 USER Command Remote Buffer Overflow Vulnerability" 812 | 34512,"LeapFTP 3.1.0 - URL Handling SEH Buffer Overflow" 813 | 34517,"Wing FTP Server Authenticated Command Execution" 814 | 34540,"BulletProof FTP Client 2010 - Buffer Overflow (SEH) Exploit" 815 | 34862,"Pure-FTPd External Authentication Bash Environment Variable Code Injection" 816 | 35051,"Freefloat FTP Server Directory Traversal Vulnerability" 817 | 35087,"net2ftp 0.98 (stable) 'admin1.template.php' Local and Remote File Include Vulnerabilities" 818 | 35177,"i-FTP 2.20 - Buffer Overflow SEH Exploit" 819 | 35188,"SolarFTP 2.1.1 - 'PASV' Command Remote Buffer Overflow Vulnerability" 820 | 35244,"Golden FTP Server 4.70 Malformed Message Denial Of Service Vulnerability" 821 | 35427,"tnftp - clientside BSD Exploit" 822 | 35449,"BulletProof FTP Client 2010 - Buffer Overflow (SEH) Exploit" 823 | 35654,"AT-TFTP Server 1.8 - 'Read' Request Remote Denial of Service Vulnerability" 824 | 35671,"i-FTP Schedule Buffer Overflow" 825 | 35712,"BulletProof FTP Client BPS Buffer Overflow" 826 | 35876,"Easewe FTP OCX ActiveX Control 4.5.0.9 'EaseWeFtp.ocx' Multiple Insecure Method Vulnerabilities" 827 | 36045,"SurgeFTP 23b6 Multiple Cross Site Scripting Vulnerabilities" 828 | 36071,"Xlight FTP Server 3.7 Remote Buffer Overflow Vulnerability" 829 | 36075,"Freefloat FTP Server 'ALLO' Command Remote Buffer Overflow Vulnerability" 830 | 36078,"PCMan FTP Server 2.0.7 - Buffer Overflow - MKD Command" 831 | 36111,"Cerberus FTP Server 4.0.9.8 Remote Buffer Overflow Vulnerability" 832 | 36126,"CrushFTP 7.2.0 - Multiple Vulnerabilities" 833 | 36361,"Titan FTP Server 8.40 'APPE' Command Remote Denial Of Service Vulnerability" 834 | 36761,"WordPress MiwoFTP Plugin 1.0.5 CSRF Arbitrary File Deletion Exploit" 835 | 36742,"ProFTPd 1.3.5 - File Copy" 836 | 36762,"WordPress MiwoFTP Plugin 1.0.5 - Multiple CSRF XSS Vulnerabilities" 837 | 36763,"WordPress MiwoFTP Plugin 1.0.5 - CSRF Arbitrary File Creation Exploit (RCE)" 838 | 36774,"WordPress MiwoFTP Plugin 1.0.5 - Arbitrary File Download Exploit" 839 | 36801,"WordPress MiwoFTP Plugin <= 1.0.5 - Arbitrary File Download" 840 | 36803,"ProFTPd 1.3.5 (mod_copy) - Remote Command Execution" 841 | 36847,"i.FTP 2.21 - SEH Overflow Crash PoC" 842 | 36861,"Wing FTP Server Admin 4.4.5 - Multiple Vulnerabilities" 843 | 36972,"TYPSoft FTP Server 1.1 'APPE' Command Remote Buffer Overflow Vulnerability" 844 | 36984,"i.FTP 2.21 - Time Field SEH Exploit" 845 | 36992,"Wing FTP Server Admin <= 4.4.5 - CSRF Add Arbitrary User" 846 | 37014,"iFTP 2.21 Buffer OverFlow Crash PoC" 847 | -------------------------------------------------------------------------------- /ftpscan.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/python3 2 | import argparse 3 | import ftplib 4 | import os 5 | from colorama import Fore,Style 6 | import socket 7 | import sys 8 | import re 9 | parser = argparse.ArgumentParser() 10 | parser.add_argument('-t','--target',required=True,help="Enter target ip") 11 | parser.add_argument('-p','--port',required=False,default=21,help="Enter target port") 12 | args = parser.parse_args() 13 | target = args.target 14 | port = args.port 15 | port = int(port) 16 | class scanner: 17 | def __init__(self,ip,port): 18 | self.ip = ip 19 | self.port = port 20 | timeout_value = 4 21 | self.ftp = ftplib.FTP(timeout=timeout_value) 22 | def connect(self): 23 | try: 24 | self.ftp.connect(self.ip,self.port) 25 | except Exception as e: 26 | print(f"[-] Connection failed , error :-") 27 | print(e) 28 | return False 29 | return True 30 | def check_anon_login(self): 31 | if self.connect(): 32 | try: 33 | self.ftp.login() 34 | print(f"[+] Anonymous login is enabled!") 35 | try: 36 | print(f"[+] Trying to list all the files..") 37 | print(self.ftp.dir("-a")) 38 | except Exception as e: 39 | print("Error Listing files ,please check manually... error :- ") 40 | print(e) 41 | except Exception as e: 42 | print(f"[-] Anonymous Login is Disabled.") 43 | class VulnScan(): 44 | def __init__(self,ip,port): 45 | self.ip = ip 46 | self.port = port 47 | self.s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 48 | self.s.settimeout(5) 49 | def grabBanner(self): 50 | try: 51 | self.s.connect((self.ip, self.port)) 52 | except Exception as e: 53 | sys.exit(0) 54 | 55 | banner = self.s.recv(1024) 56 | final = banner.decode('utf-8') 57 | self.s.close() 58 | if final.startswith('220'): 59 | final = final[4:] 60 | return final 61 | @staticmethod 62 | def vuln_check(banner): 63 | try: 64 | with open('ftp-vuln.db', 'r') as fp: 65 | print(f"[*] Searching Exploits in the database for banner {banner}") 66 | exploit_counter = 0 67 | 68 | # Try to extract software and version 69 | match = re.findall(r'\((.*?) (.*?)\)', banner) 70 | if match: 71 | fsoftware, fsversion = match[0] 72 | else: 73 | # If no version info, use the entire banner as software name 74 | fsoftware = banner.strip() 75 | fsversion = '' 76 | 77 | for line in fp: 78 | match = re.match(r'(\d+),"(.+)"', line) 79 | if match: 80 | id, exploit = match.groups() 81 | id = int(id) 82 | 83 | # Case-insensitive match for software name and version 84 | if fsoftware.lower() in exploit.lower() and (fsversion.lower() in exploit.lower() or fsversion == ''): 85 | print(Fore.GREEN + "[+] FTP Version is vulnerable!! ") 86 | print(Fore.WHITE + Style.BRIGHT + f"[+] Exploit: {exploit}") 87 | print(Fore.WHITE + Style.BRIGHT + f"[*] Exploit DB : http://exploit-db.com/download/{id}") 88 | exploit_counter += 1 89 | 90 | if exploit_counter == 0: 91 | print("[+] No exploits found in DB file..") 92 | 93 | except FileNotFoundError: 94 | print("[-] Failed to open the ftp-vuln.db file.") 95 | except Exception as e: 96 | print(f"[-] Error: {e}") 97 | 98 | 99 | 100 | 101 | 102 | 103 | def menu(): 104 | 105 | banner=''' 106 | ╭━━━┳╮ 107 | ┃╭━┳╯╰╮ 108 | ┃╰━┻╮╭╋━━╮╱╱╭━━┳━━┳━━┳━╮ 109 | ┃╭━━┫┃┃╭╮┣━━┫━━┫╭━┫╭╮┃╭╮╮ 110 | ┃┃╱╱┃╰┫╰╯┣━━╋━━┃╰━┫╭╮┃┃┃┃ 111 | ╰╯╱╱╰━┫╭━╯╱╱╰━━┻━━┻╯╰┻╯╰╯ 112 | ╱╱╱╱╱╱┃┃ 113 | ╱╱╱╱╱╱╰╯ 114 | ''' 115 | print(Fore.RED+banner+Fore.RESET) 116 | print(Fore.RED+"Author - Sc17"+Fore.RESET) 117 | print(Fore.RED+"Github - https://github.com/MIISTERC"+Fore.RESET) 118 | menu() 119 | scan = scanner(target,port) 120 | scan.check_anon_login() 121 | vuln = VulnScan(target,port) 122 | banner = vuln.grabBanner() 123 | print("Banner Grabbed! : ",banner) 124 | vuln.vuln_check(banner) 125 | -------------------------------------------------------------------------------- /requirements.txt: -------------------------------------------------------------------------------- 1 | argparse 2 | colorama 3 | 4 | -------------------------------------------------------------------------------- /setup.sh: -------------------------------------------------------------------------------- 1 | echo "---------------------------------------------------------------" 2 | echo "Setup Script for Ftp-scan" 3 | echo "---------------------------------------------------------------" 4 | if [[ $(id -u) -ne 0 ]]; then 5 | echo "please run this script as root!" 6 | exit 1 7 | else 8 | if [[ -e /usr/bin/ftpscan ]]; then 9 | echo "/usr/bin/ftpscan exists! You already ran the setup file earlier!" 10 | exit 1 11 | else 12 | echo "installing essential python libraries..." 13 | pip3 install -r requirements.txt 14 | echo "Creating Symbolic link...." 15 | cdir=$(pwd) 16 | path=$cdir/ftpscan.py 17 | sudo ln -s "$path" /usr/bin/ftpscan 18 | chmod +x /usr/bin/ftpscan 19 | echo "Setup Done! now execute ftpscan" 20 | ftpscan -h 21 | fi 22 | fi 23 | --------------------------------------------------------------------------------