Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

proftpd

About This Vendor

proftpd is a technology vendor producing software and infrastructure products. As a software provider, proftpd's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of proftpd's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 28 known vulnerabilities from proftpd. This includes 2 critical-severity issues and 14 high-severity issues that represent significant risk. These vulnerabilities affect 78 distinct products across proftpd's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2001 through 2025, indicating decades of continuous security attention and research. Organizations deploying proftpd products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2001-0136 2001-03-12 2025-04-03 - 5.0 Likely
CVE-2004-1602 2004-10-15 2025-04-03 - 5.0 Likely
CVE-2004-0346 2004-11-23 2025-04-03 7.8 7.2 Unknown
CVE-2009-0543 2009-02-12 2025-04-09 - 6.8 Likely
CVE-2009-3639 2009-10-28 2025-04-09 - 5.8 Likely
CVE-2008-7265 2010-11-09 2025-04-11 - 4.0 Likely
CVE-2010-3867 2010-11-09 2025-04-11 - 7.1 Unknown
CVE-2010-4221 2010-11-09 2025-04-11 - 10.0 Likely
CVE-2010-4652 2011-02-02 2025-04-11 - 6.8 Likely
CVE-2011-1137 2011-03-11 2025-04-11 - 5.0 Likely
CVE-2011-4130 2011-12-06 2025-04-11 - 9.0 Likely
CVE-2012-6095 2013-01-24 2025-04-11 - 1.2 Unknown
CVE-2013-4359 2013-09-30 2025-04-11 - 5.0 Likely
CVE-2015-3306 2015-05-18 2025-04-12 - 10.0 Likely
CVE-2016-3125 2016-04-05 2025-04-12 7.5 5.0 Likely
CVE-2017-7418 2017-04-04 2025-04-20 5.5 2.1 Unknown
CVE-2019-12815 2019-07-19 2025-11-04 9.8 7.5 Likely
CVE-2019-18217 2019-10-21 2024-11-21 7.5 5.0 Likely
CVE-2019-19270 2019-11-26 2024-11-21 7.5 5.0 Likely
CVE-2019-19271 2019-11-26 2024-11-21 7.5 5.0 Likely
CVE-2019-19272 2019-11-26 2024-11-21 7.5 5.0 Likely
CVE-2019-19269 2019-11-30 2024-11-21 4.9 4.0 Likely
CVE-2020-9272 2020-02-20 2024-11-21 7.5 5.0 Likely
CVE-2020-9273 2020-02-20 2024-11-21 8.8 9.0 Likely
CVE-2021-46854 2022-11-23 2025-04-28 7.5 - -
CVE-2023-48795 2023-12-18 2025-11-04 5.9 - -
CVE-2023-51713 2023-12-22 2025-11-03 7.5 - -
CVE-2010-20103 2025-08-20 2025-09-24 9.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for proftpd by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with proftpd's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.