
CVE-2025-3372 – PCMan FTP Server MKDIR Command buffer overflow
https://notcve.org/view.php?id=CVE-2025-3372
07 Apr 2025 — A vulnerability, which was classified as critical, was found in PCMan FTP Server 2.0.7. Affected is an unknown function of the component MKDIR Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://fitoxs.com/exploit/01-exploit.txt • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2025-3371 – PCMan FTP Server DELETE Command buffer overflow
https://notcve.org/view.php?id=CVE-2025-3371
07 Apr 2025 — A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. This issue affects some unknown processing of the component DELETE Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://fitoxs.com/exploit/exploit1.txt • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2025-3349 – PCMan FTP Server SYST Command buffer overflow
https://notcve.org/view.php?id=CVE-2025-3349
07 Apr 2025 — A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. This issue affects some unknown processing of the component SYST Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?id.303563 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2021-41634
https://notcve.org/view.php?id=CVE-2021-41634
24 Jun 2022 — A user enumeration vulnerability in MELAG FTP Server 2.2.0.4 allows an attacker to identify valid FTP usernames. Una vulnerabilidad de enumeración de usuarios en MELAG FTP Server versión 2.2.0.4, permite a un atacante identificar nombres de usuario FTP válidos • https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server • CWE-203: Observable Discrepancy •

CVE-2021-41635
https://notcve.org/view.php?id=CVE-2021-41635
24 Jun 2022 — When installed as Windows service MELAG FTP Server 2.2.0.4 is run as SYSTEM user, which grants remote attackers to abuse misconfigurations or vulnerabilities with administrative access over the entire host system. Cuando es instalado como servicio de Windows, MELAG FTP Server versión 2.2.0.4, es ejecutado como usuario SYSTEM, lo que permite a atacantes remotos abusar de configuraciones erróneas o vulnerabilidades con acceso administrativo sobre todo el sistema anfitrión • https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server • CWE-276: Incorrect Default Permissions •

CVE-2021-41636
https://notcve.org/view.php?id=CVE-2021-41636
24 Jun 2022 — MELAG FTP Server 2.2.0.4 allows an attacker to use the CWD command to break out of the FTP servers root directory and operate on the entire operating system, while the access restrictions of the user running the FTP server apply. MELAG FTP Server versión 2.2.0.4, permite a un atacante usar el comando CWD para salir del directorio root del servidor FTP y operar en todo el sistema operativo, mientras son aplicadas las restricciones de acceso del usuario que ejecuta el servidor FTP • https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2021-41637
https://notcve.org/view.php?id=CVE-2021-41637
24 Jun 2022 — Weak access control permissions in MELAG FTP Server 2.2.0.4 allow the "Everyone" group to read the local FTP configuration file, which includes among other information the unencrypted passwords of all FTP users. Unos permisos débiles de control de acceso en MELAG FTP Server versión 2.2.0.4, permiten al grupo "Everyone" leer el archivo de configuración local del FTP, que incluye, entre otra información, las contraseñas no cifradas de todos los usuarios del FTP • https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server • CWE-276: Incorrect Default Permissions •

CVE-2021-41638
https://notcve.org/view.php?id=CVE-2021-41638
24 Jun 2022 — The authentication checks of the MELAG FTP Server in version 2.2.0.4 are incomplete, which allows a remote attacker to access local files only by using a valid username. Unas comprobaciones de autenticación de MELAG FTP Server en la versión 2.2.0.4 son incompletas, lo que permite a un atacante remoto acceder a archivos locales sólo usando un nombre de usuario válido • https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server • CWE-287: Improper Authentication •

CVE-2021-41639
https://notcve.org/view.php?id=CVE-2021-41639
24 Jun 2022 — MELAG FTP Server 2.2.0.4 stores unencrpyted passwords of FTP users in a local configuration file. MELAG FTP Server versión 2.2.0.,4 almacena las contraseñas no cifradas de los usuarios de FTP en un archivo de configuración local • https://www.securesystems.de/blog/advisory-and-exploitation-the-melag-ftp-server • CWE-312: Cleartext Storage of Sensitive Information •

CVE-2019-25046 – Cerberus FTP Web Service 11 - 'svg' Stored Cross-Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2019-25046
10 Jun 2021 — The Web Client in Cerberus FTP Server Enterprise before 10.0.19 and 11.x before 11.0.4 allows XSS via an SVG document. El Cliente Web en Cerberus FTP Server Enterprise versiones anteriores a 10.0.19 y 11.x versiones anteriores a 11.0.4 permite un XSS por medio de un documento SVG • https://www.exploit-db.com/exploits/49981 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •