10 results (0.007 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

SolarWinds Serv-U before 15.2 is affected by Cross Site Scripting (XSS) via the HTTP Host header. SolarWinds Serv-U versiones anteriores a 15.2, está afectado por una vulnerabilidad de tipo Cross Site Scripting (XSS) por medio del encabezado HTTP Host • https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-2_release_notes.htm https://github.com/matrix https://twitter.com/gm4tr1x https://www.linkedin.com/in/gabrielegristina • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 0%CPEs: 89EXPL: 3

Directory traversal vulnerability in Serv-U FTP Server before 11.1.0.5 allows remote authenticated users to read and write arbitrary files, and list and create arbitrary directories, via a "..:/" (dot dot colon forward slash) in the (1) list, (2) put, or (3) get commands. Vulnerabilidad de salto de directorio en Serv-U FTP Server antes de v11.1.0.5 permite a usuarios autenticados remotamente leer y escribir archivos de su elección y listar y crear directorios de su elección a través de "..:/" (punto punto dos puntos barra oblicua) en los comandos (1) list, (2) put, o (3) get. • https://www.exploit-db.com/exploits/18182 http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0454.html http://secunia.com/advisories/47021 http://www.exploit-db.com/exploits/18182 http://www.serv-u.com/releasenotes • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.0EPSS: 0%CPEs: 62EXPL: 0

Directory traversal vulnerability in Serv-U before 9.2.0.1 allows remote authenticated users to read arbitrary files via unspecified vectors. Vulnerabilidad de salto de directorio en Serv-U en versiones anteriores a la 9.2.0.1 permite a atacantes remotos autenticados leer ficheros de su elección mediante vectores no especificados. • http://secunia.com/advisories/37847 http://www.securityfocus.com/bid/37414 http://www.serv-u.com/releasenotes http://www.vupen.com/english/advisories/2009/3595 https://exchange.xforce.ibmcloud.com/vulnerabilities/54932 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 10.0EPSS: 93%CPEs: 28EXPL: 1

Stack-based buffer overflow in the TEA decoding algorithm in RhinoSoft Serv-U FTP server 7.0.0.1, 9.0.0.5, and other versions before 9.1.0.0 allows remote attackers to execute arbitrary code via a long hexadecimal string. Un desbordamiento de búfer en la región stack de la memoria en el algoritmo de decodificación TEA en servidor FTP Serv-U de RhinoSoft versiones 7.0.0.1, 9.0.0.5 y otras versiones anteriores a 9.1.0.0, permite a los atacantes remotos ejecutar código arbitrario por medio de una cadena hexadecimal larga. • https://www.exploit-db.com/exploits/16775 http://secunia.com/advisories/37228 http://secunia.com/secunia_research/2009-46 http://www.osvdb.org/60427 http://www.securityfocus.com/archive/1/507955/100/0/threaded http://www.securityfocus.com/bid/37051 http://www.securitytracker.com/id?1023199 http://www.serv-u.com/releasenotes http://www.vupen.com/english/advisories/2009/3277 https://exchange.xforce.ibmcloud.com/vulnerabilities/54322 https://oval.cisecurity.org/repository/sea • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 24EXPL: 0

Rhino Software Serv-U 7.0.0.1 through 8.2.0.3 allows remote attackers to cause a denial of service (server crash) via unspecified vectors related to the "SITE SET TRANSFERPROGRESS ON" FTP command. Rhino Software Serv-U v7.0.0.1 a v8.2.0.3 permite a atacantes remotos causar una denegación de servicio (mediante caída del servidor) a través de vectores no especificados relacionados con el comando FTP "SITE SET TRANSFERPROGRESS ON". • http://secunia.com/advisories/36873 http://www.serv-u.com/releasenotes https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5798 •