Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-4221

EPSS 91.75% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2010-4221

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ProFTPD栈缓冲区溢出漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ProFTPD 是一款开放源代码FTP服务程序。 ProFTPD 1.3.3c之前版本中的netio.c文件中的pr_netio_telnet_gets函数中存在多个基于栈的缓冲区溢出漏洞。远程攻击者可以借助向(1)FTP或者(2)FTPS服务器提交与TELNET IAC转义字符有关恶意输入执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2010-4221

#POC DescriptionSource LinkShenlong Link
1This exploit was written to study some concepts, enjoy!https://github.com/M31MOTH/cve-2010-4221POC Details
2This exploit was written to study some concepts, enjoy!https://github.com/M41doror/cve-2010-4221POC Details
3Penetration test walkthrough on a vulnerable Ubuntu VM. Exploited the ProFTPD 1.3.3c backdoor (CVE-2010-4221) to gain root access and capture the flag. Includes Nmap enumeration, Metasploit payload setup, and user hash cracking (John the Ripper).https://github.com/Mafiosohack/Offensive-lab-2POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2010-4221

登录查看更多情报信息。

Same Patch Batch · n/a · 2010-11-09 · 19 CVEs total

CVE-2010-3077Horde Application Framework util/icon_browser.php文件跨站脚本攻击漏洞
CVE-2010-4220IBM WAS Administrative Console组件跨站脚本攻击漏洞
CVE-2010-4219IBM WebSphere Portal SemanticTagService.js文件跨站脚本攻击漏洞
CVE-2010-4218IBM ENOVIA Web Services未明漏洞
CVE-2010-4217IBM TDS释放后使用漏洞
CVE-2010-4216IBM TDS LDAP BER请求缓冲区溢出漏洞
CVE-2010-3871Mahara blocktype/groupviews/theme/raw/groupviews.tpl文件跨站脚本攻击漏洞
CVE-2010-3867ProFTPD mod_site_misc模块多个目录遍历漏洞
CVE-2010-3694Horde Application Framework util/icon_browser.php文件跨站请求伪造漏洞
CVE-2008-7265ProFTPD pr_data_xfer函数资源管理错误漏洞
CVE-2010-3040Cisco ICM Setup Manager 'agent.exe'缓冲区溢出漏洞
CVE-2010-3039Cisco Unified Communications Manager pktCap_protectData路径操作系统命令注入漏洞
CVE-2010-2636IBM WebSphere Commerce存储页面多个跨站脚本攻击漏洞
CVE-2010-2635IBM WebSphere Commerce SQL注入漏洞
CVE-2010-0786IBM WAS Web Services Security组件输入验证漏洞
CVE-2010-0785IBM WAS跨站请求伪造漏洞
CVE-2010-0784IBM WAS管理控制台跨站脚本攻击漏洞
CVE-2010-0783IBM WAS跨站脚本攻击漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2010-4221

No comments yet


Leave a comment