Page 2 of 16 results (0.007 seconds)

CVSS: 5.3EPSS: 9%CPEs: 1EXPL: 2

An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. Using the MDTM FTP command, a remote attacker can use a directory traversal technique (..\..\) to browse outside the root directory to determine the existence of a file on the operating system, and its last modified date. Se ha descubierto un problema en el componente SFTP Server en Core FTP 2.0 Build 674. Mediante el uso del comando MDTM FTP, un atacante remoto puede emplear una técnica de salto de directorio (..\..\) para navegar fuera del directorio root para determinar la existencia de un archivo en el sistema operativo, así como su fecha de última modificación. CoreFTP Server FTP and SFTP Server version 2 build 674 suffer from a directory traversal vulnerability. • https://www.exploit-db.com/exploits/46534 http://packetstormsecurity.com/files/154205/CoreFTP-Server-MDTM-Directory-Traversal.html http://seclists.org/fulldisclosure/2019/Aug/22 http://www.coreftp.com/forums/viewtopic.php?f=15&t=4022509 http://www.securityfocus.com/bid/107449 https://seclists.org/fulldisclosure/2019/Mar/25 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.3EPSS: 4%CPEs: 1EXPL: 2

An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. A directory traversal vulnerability exists using the SIZE command along with a \..\..\ substring, allowing an attacker to enumerate file existence based on the returned information. Se ha descubierto un problema en el componente SFTP Server en Core FTP 2.0 Build 674. Existe una vulnerabilidad de salto de directorio empleando el comando SIZE junto con una subcadena \..\..\, lo que permite que un atacante enumere la existencia de archivos basándose en la información devuelta. CoreFTP Server FTP and SFTP Server version 2 build 674 suffer from a directory traversal vulnerability. • https://www.exploit-db.com/exploits/46535 http://packetstormsecurity.com/files/154204/CoreFTP-Server-SIZE-Directory-Traversal.html http://seclists.org/fulldisclosure/2019/Aug/21 http://www.coreftp.com/forums/viewtopic.php?f=15&t=4022509 http://www.securityfocus.com/bid/107446 https://seclists.org/fulldisclosure/2019/Mar/23 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 7%CPEs: 1EXPL: 1

The server in Core FTP 2.0 build 653 on 32-bit platforms allows remote attackers to cause a denial of service (daemon crash) via a crafted XRMD command. El servidor en Core FTP 2.0 build 653 en plataformas de 32 bits permite a los atacantes remotos provocar una denegación de servicio (cierre inesperado del demonio) mediante un comando XRMD manipulado. • https://www.exploit-db.com/exploits/45091 http://coreftp.com/forums/viewtopic.php?f=15&t=4022509 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 10%CPEs: 1EXPL: 3

Core FTP LE version 2.2 Build 1921 is prone to a buffer overflow vulnerability that may result in a DoS or remote code execution via a PASV response. Core FTP LE 2.2 Build 1921 es propenso a una vulnerabilidad de desbordamiento de búfer que podría resultar en una denegación de servicio (DoS) o la ejecución remota de código mediante una respuesta PASV. • http://packetstormsecurity.com/files/148383/Core-FTP-LE-2.2-Buffer-Overflow.html https://gist.github.com/berkgoksel/a654c8cb661c7a27a3f763dee92016aa https://gist.github.com/berkgoksel/e97b3f3b15e2f8293f649d4ebe6a6fc9 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 3

Multiple heap-based buffer overflows in the client in Core FTP LE 2.2 build 1798 allow remote FTP servers to cause a denial of service (application crash) and possibly execute arbitrary code via a long string in a reply to a (1) USER, (2) PASS, (3) PASV, (4) SYST, (5) PWD, or (6) CDUP command. Múltiples desbordamientos de buffer basado en memoria dinámica en el cliente en Core FTP LE 2.2 build 1798 permiten a servidores FTP causar una denegación de servicio (caída de aplicación) y posiblemente ejecutar código arbitrario a través de una cadena larga en una respuesta a un comando (1) USER, (2) PASS, (3) PASV, (4) SYST, (5) PWD o (6) CDUP. • https://www.exploit-db.com/exploits/33713 http://osvdb.org/show/osvdb/108051 http://packetstormsecurity.com/files/127075/Core-FTP-LE-2.2-Heap-Overflow.html http://secunia.com/advisories/58818 http://www.exploit-db.com/exploits/33713 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •