Page 3 of 18 results (0.004 seconds)

CVSS: 10.0EPSS: 1%CPEs: 12EXPL: 0

ArGoSoft FTP Server before 1.4.2.8 allows remote attackers to read arbitrary files via shortcut (.LNK) files in the SITE COPY command, a different vulnerability than CVE-2005-0519. • http://secunia.com/advisories/14372 http://www.argosoft.com/ftpserver/changelist.aspx http://www.osvdb.org/14061 http://www.securityfocus.com/bid/12632 https://exchange.xforce.ibmcloud.com/vulnerabilities/19442 •

CVSS: 10.0EPSS: 1%CPEs: 12EXPL: 0

ArGoSoft FTP Server before 1.4.2.7 allows remote attackers to read arbitrary files by uploading a ZIP file containing a shortcut (.LNK) file, using SITE UNZIP to extract the .LNK file onto the server, then accessing the file, a different vulnerability than CVE-2005-0520. • http://secunia.com/advisories/14172 http://www.argosoft.com/ftpserver/changelist.aspx http://www.osvdb.org/13614 http://www.securityfocus.com/bid/12487 https://exchange.xforce.ibmcloud.com/vulnerabilities/17939 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in ArGoSoft FTP server before 1.4.2.2 allows attackers to upload .lnk files via unknown vectors. • http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx •

CVSS: 6.8EPSS: 2%CPEs: 1EXPL: 2

ArGoSoft FTP Server before 1.4.1.6 allows remote authenticated users to cause a denial of service (crash) via a SITE PASS command with a long password parameter, which causes the database to be corrupted. • https://www.exploit-db.com/exploits/23769 http://secunia.com/advisories/11002 http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx http://www.osvdb.org/11332 http://www.securiteam.com/windowsntfocus/5RP010KCAO.html http://www.securityfocus.com/bid/9770 https://exchange.xforce.ibmcloud.com/vulnerabilities/15412 •

CVSS: 9.0EPSS: 1%CPEs: 1EXPL: 1

Multiple buffer overflows in ArGoSoft FTP Server before 1.4.1.6 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via (1) a SITE ZIP command with a long first or second argument, or (2) a SITE COPY with a long argument. • http://secunia.com/advisories/11002 http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx http://www.osvdb.org/11334 http://www.securiteam.com/windowsntfocus/5RP010KCAO.html http://www.securityfocus.com/bid/9770 https://exchange.xforce.ibmcloud.com/vulnerabilities/15410 •