Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/37929?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37929?format=api", "vulnerability_id": "VCID-ca3u-gmsu-7ugq", "summary": "ProFTPD is affected by mutiple vulnerabilities allowing for the remote\n execution of arbitrary code.", "aliases": [ { "alias": "CVE-2006-5815" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/935823?format=api", "purl": "pkg:deb/debian/proftpd-dfsg@1.3.0-15?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/proftpd-dfsg@1.3.0-15%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935820?format=api", "purl": "pkg:deb/debian/proftpd-dfsg@1.3.7a%2Bdfsg-12%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/proftpd-dfsg@1.3.7a%252Bdfsg-12%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935818?format=api", "purl": "pkg:deb/debian/proftpd-dfsg@1.3.8%2Bdfsg-4%2Bdeb12u4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gw9f-rc1s-8udd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/proftpd-dfsg@1.3.8%252Bdfsg-4%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935822?format=api", "purl": "pkg:deb/debian/proftpd-dfsg@1.3.8.c%2Bdfsg-4%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/proftpd-dfsg@1.3.8.c%252Bdfsg-4%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/935821?format=api", "purl": "pkg:deb/debian/proftpd-dfsg@1.3.9~dfsg-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/proftpd-dfsg@1.3.9~dfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/74707?format=api", "purl": "pkg:ebuild/net-ftp/proftpd@1.3.0a", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-ftp/proftpd@1.3.0a" } ], "affected_packages": [], "references": [ { "reference_url": "http://bugs.proftpd.org/show_bug.cgi?id=2858", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.proftpd.org/show_bug.cgi?id=2858" }, { "reference_url": "http://gleg.net/vulndisco_meta.shtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://gleg.net/vulndisco_meta.shtml" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-5815", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.73385", "scoring_system": "epss", "scoring_elements": "0.98801", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.73385", "scoring_system": "epss", "scoring_elements": "0.98786", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.73385", "scoring_system": "epss", "scoring_elements": "0.98789", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.73385", "scoring_system": "epss", "scoring_elements": "0.98792", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.73385", "scoring_system": "epss", "scoring_elements": "0.98793", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.73385", "scoring_system": "epss", "scoring_elements": "0.98795", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.73385", "scoring_system": "epss", "scoring_elements": "0.98796", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.73385", "scoring_system": "epss", "scoring_elements": "0.98797", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-5815" }, { "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815" }, { "reference_url": "http://secunia.com/advisories/22803", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/22803" }, { "reference_url": "http://secunia.com/advisories/22821", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/22821" }, { "reference_url": "http://secunia.com/advisories/23000", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23000" }, { "reference_url": "http://secunia.com/advisories/23069", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23069" }, { "reference_url": "http://secunia.com/advisories/23125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23125" }, { "reference_url": "http://secunia.com/advisories/23174", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23174" }, { "reference_url": "http://secunia.com/advisories/23179", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23179" }, { "reference_url": "http://secunia.com/advisories/23184", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23184" }, { "reference_url": "http://secunia.com/advisories/23207", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23207" }, { "reference_url": "http://securitytracker.com/id?1017167", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1017167" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30147" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491" }, { "reference_url": "http://www.debian.org/security/2006/dsa-1222", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-1222" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1" }, { "reference_url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/452760/100/200/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/452760/100/200/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/20992", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/20992" }, { "reference_url": "http://www.trustix.org/errata/2006/0066/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2006/0066/" }, { "reference_url": "http://www.trustix.org/errata/2006/0070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2006/0070" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/4451", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/4451" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=399070", "reference_id": "399070", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=399070" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd_project:proftpd:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:proftpd_project:proftpd:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:proftpd_project:proftpd:*:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/2856.pm", "reference_id": "CVE-2006-5815", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/2856.pm" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5815", "reference_id": "CVE-2006-5815", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5815" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16852.rb", "reference_id": "CVE-2006-5815;OSVDB-68985", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16852.rb" }, { "reference_url": "https://security.gentoo.org/glsa/200611-26", "reference_id": "GLSA-200611-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200611-26" } ], "weaknesses": [ { "cwe_id": 119, "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "description": "The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer." } ], "exploits": [ { "date_added": "2006-11-26", "description": "ProFTPd 1.3.0 - 'sreplace' Remote Stack Overflow (Metasploit)", "required_action": null, "due_date": null, "notes": null, "known_ransomware_campaign_use": true, "source_date_published": "2006-11-27", "exploit_type": "remote", "platform": "linux", "source_date_updated": "2017-08-29", "data_source": "Exploit-DB", "source_url": "" }, { "date_added": null, "description": "This module exploits a stack-based buffer overflow in versions 1.2 through\n 1.3.0 of ProFTPD server. The vulnerability is within the \"sreplace\" function\n within the \"src/support.c\" file.\n\n The off-by-one heap overflow bug in the ProFTPD sreplace function has been\n discovered about 2 (two) years ago by Evgeny Legerov. We tried to exploit\n this off-by-one bug via MKD command, but failed. We did not work on this bug\n since then.\n\n Actually, there are exists at least two bugs in sreplace function, one is the\n mentioned off-by-one heap overflow bug the other is a stack-based buffer overflow\n via 'sstrncpy(dst,src,negative argument)'.\n\n We were unable to reach the \"sreplace\" stack bug on ProFTPD 1.2.10 stable\n version, but the version 1.3.0rc3 introduced some interesting changes, among them:\n\n 1. another (integer) overflow in sreplace!\n 2. now it is possible to reach sreplace stack-based buffer overflow bug via\n the \"pr_display_file\" function!\n 3. stupid '.message' file display bug\n\n So we decided to choose ProFTPD 1.3.0 as a target for our exploit.\n To reach the bug, you need to upload a specially created .message file to a\n writeable directory, then do \"CWD <writeable directory>\" to trigger the invocation\n of sreplace function.\n\n Note that ProFTPD 1.3.0rc3 has introduced a stupid bug: to display '.message'\n file you also have to upload a file named '250'. ProFTPD 1.3.0 fixes this bug.\n\n The exploit is a part of VulnDisco Pack since Dec 2005.", "required_action": null, "due_date": null, "notes": "Stability:\n - crash-service-down\nSideEffects:\n - artifacts-on-disk\n - ioc-in-logs\nReliability:\n - unreliable-session\n", "known_ransomware_campaign_use": false, "source_date_published": "2006-11-26", "exploit_type": null, "platform": "Linux", "source_date_updated": null, "data_source": "Metasploit", "source_url": "https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/linux/ftp/proftp_sreplace.rb" } ], "severity_range_score": "10.0 - 10.0", "exploitability": null, "weighted_severity": null, "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ca3u-gmsu-7ugq" }