{"id":"PYSEC-2010-22","details":"pyftpdlib before 0.1.1 does not choose a random value for the port associated with the PASV command, which makes it easier for remote attackers to obtain potentially sensitive information about the number of in-progress data connections by reading the response to this command.","aliases":["CVE-2007-6738","GHSA-gh7c-cg3x-pmcr"],"modified":"2024-04-29T15:11:31.494422Z","published":"2010-10-19T20:00:00Z","references":[{"type":"WEB","url":"http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY"}],"affected":[{"package":{"name":"pyftpdlib","ecosystem":"PyPI","purl":"pkg:pypi/pyftpdlib"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.1.1"}]}],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/pyftpdlib/PYSEC-2010-22.yaml"}}],"schema_version":"1.7.3"}