Page 2 of 8 results (0.003 seconds)

CVSS: 4.0EPSS: 6%CPEs: 126EXPL: 1

Directory traversal vulnerability in TitanFTPd in South River Technologies Titan FTP Server 8.10.1125, and probably earlier versions, allows remote authenticated users to read arbitrary files, determine file size, via "..//" sequences in the xcrc command. Vulnerabilidad de salto de directorio en TitanFTPd en South River Technologies Titan FTP Server v8.10.1125, y probablemente versiones anteriores, permite a usuarios autentificados remotamente leer ficheros de su elección, tamaño de fichero determinado, a través de la secuencia "..//" en el comando xcrc. • http://osvdb.org/65533 http://secunia.com/advisories/40237 http://www.securityfocus.com/archive/1/511839/100/0/threaded http://www.securityfocus.com/bid/40949 https://exchange.xforce.ibmcloud.com/vulnerabilities/59492 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 4%CPEs: 5EXPL: 2

Heap-based buffer overflow in Titan FTP 3.21 and earlier allows remote attackers to cause a denial of service (crash) via a long FTP command such as (1) CWD, (2) STAT, or (3) LIST. • https://www.exploit-db.com/exploits/426 http://marc.info/?l=bugtraq&m=109396159332523&w=2 http://secunia.com/advisories/12419 http://www.securityfocus.com/bid/11069 https://exchange.xforce.ibmcloud.com/vulnerabilities/17172 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 3

Titan FTP Server version 3.01 build 163, and possibly other versions before build 169, allows remote authenticated users to cause a denial of service (crash) by disconnecting from the system during a "LIST -L" command, which causes Titan to access an invalid socket. Titan FTP Server versión 3.01 compilación 163, y posiblemente otras versiones anteriores a compilación 169, permite a usuarios remotos autenticados causar una denegación de servicio (caída) desconectando del sistema durante una órden "LIST - L", lo que causa que Titan acceda a un socket no válido. • https://www.exploit-db.com/exploits/24080 http://archives.neohapsis.com/archives/vulnwatch/2004-q2/0025.html http://marc.info/?l=bugtraq&m=108378048513596&w=2 http://www.securiteam.com/windowsntfocus/5RP0215CUU.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16057 •