3 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as problematic was found in Xlightftpd Xlight FTP Server 1.1. This vulnerability affects unknown code of the component Login. The manipulation of the argument user leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://packetstormsecurity.com/files/176553/LightFTP-1.1-Denial-Of-Service.html https://vuldb.com/?ctiid.251560 https://vuldb.com/?id.251560 • CWE-404: Improper Resource Shutdown or Release •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in the SFTP/SSH2 virtual server in Xlight FTP Server 3.5.0, 3.5.5, and possibly other versions before 3.6 allows remote authenticated users to read, overwrite, or delete arbitrary files via .. (dot dot) sequences in the (1) ls, (2) rm, (3) rename, and other unspecified commands. Vulnerabilidad de salto de directorio en SFTP/SSH2 virtual server en Xlight FTP Server v3.5.0, v3.5.5, y posiblemente otras versiones anteriores a v3.6 permite a atacantes remotos autenticados leer, sobreescribir o eliminar ficheros arbitrarios mediante secuencias .. (punto punto) en (1) ls, (2) rm, (3) rename y otros otros comandos no especificados • http://osvdb.org/66037 http://secunia.com/advisories/40473 http://www.securityfocus.com/archive/1/512192/100/0/threaded http://www.xlightftpd.com/whatsnew.htm https://exchange.xforce.ibmcloud.com/vulnerabilities/60151 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 0%CPEs: 33EXPL: 3

Multiple SQL injection vulnerabilities in Xlight FTP Server before 3.2.1, when ODBC authentication is enabled, allow remote attackers to execute arbitrary SQL commands via the (1) USER (aka username) or (2) PASS (aka password) command. Multiples vulnerabilidades de inyección SQL en Xlight FTP Server en versiones anteriores a la v3.2.1, cuando la autenticación ODBC está activada, permite a los usuarios remotos autenticados ejecutar comandos de su elección SQL a través del comando (1) USER (también conocido como username) o (2) PASS (password). • https://www.exploit-db.com/exploits/32877 http://secunia.com/advisories/34513 http://www.securityfocus.com/bid/34288 http://www.xlightftpd.com/forum/viewtopic.php?t=1042 http://www.xlightftpd.com/whatsnew.htm https://exchange.xforce.ibmcloud.com/vulnerabilities/49495 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •