Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-3867

EPSS 0.38% · P59
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2010-3867

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ProFTPD mod_site_misc模块多个目录遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ProFTPD 是一款开放源代码FTP服务程序。 ProFTPD 1.3.3c之前版本中的mod_site_misc模块中存在多个目录遍历漏洞。远程认证用户可以借助(1)SITE MKDIR,(2)SITE RMDIR,(3)SITE SYMLINK,或者(4)SITE UTIME命令中的目录遍历序列创建目录,删除目录,创建符号链接,以及修改文件时间。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2010-3867

#POC DescriptionSource LinkShenlong Link
1ProFTPD versions before 1.3.3c contain directory traversal vulnerabilities in the mod_site_misc module. The vulnerability allows attackers to traverse directories and potentially overwrite arbitrary files on the system through crafted input to commands like SITE MKDIR and other SITE commands. https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2010/CVE-2010-3867.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2010-3867

Please Login to view more intelligence information

Same Patch Batch · n/a · 2010-11-09 · 19 CVEs total

CVE-2010-3077Horde Application Framework util/icon_browser.php文件跨站脚本攻击漏洞
CVE-2010-4221ProFTPD栈缓冲区溢出漏洞
CVE-2010-4220IBM WAS Administrative Console组件跨站脚本攻击漏洞
CVE-2010-4219IBM WebSphere Portal SemanticTagService.js文件跨站脚本攻击漏洞
CVE-2010-4218IBM ENOVIA Web Services未明漏洞
CVE-2010-4217IBM TDS释放后使用漏洞
CVE-2010-4216IBM TDS LDAP BER请求缓冲区溢出漏洞
CVE-2010-3871Mahara blocktype/groupviews/theme/raw/groupviews.tpl文件跨站脚本攻击漏洞
CVE-2010-3694Horde Application Framework util/icon_browser.php文件跨站请求伪造漏洞
CVE-2008-7265ProFTPD pr_data_xfer函数资源管理错误漏洞
CVE-2010-3040Cisco ICM Setup Manager 'agent.exe'缓冲区溢出漏洞
CVE-2010-3039Cisco Unified Communications Manager pktCap_protectData路径操作系统命令注入漏洞
CVE-2010-2636IBM WebSphere Commerce存储页面多个跨站脚本攻击漏洞
CVE-2010-2635IBM WebSphere Commerce SQL注入漏洞
CVE-2010-0786IBM WAS Web Services Security组件输入验证漏洞
CVE-2010-0785IBM WAS跨站请求伪造漏洞
CVE-2010-0784IBM WAS管理控制台跨站脚本攻击漏洞
CVE-2010-0783IBM WAS跨站脚本攻击漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2010-3867

No comments yet


Leave a comment