Page 3 of 14 results (0.002 seconds)

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 2

Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to obtain the property information of an arbitrary home folder via a Properties action with a .. (dot dot) in the src parameter. Vulnerabilidad de salto de directorio en la interfaz web en Titan FTP Server anterior a 10.40 build 1829 permite a atacantes remotos obtener la información de propiedad de una carpeta home arbitraria a través de una acción Properties con un .. (punto punto) en el parámetro src. Titan FTP server version 10.32 Build 1816 suffers from multiple directory traversal vulnerabilities. • https://www.exploit-db.com/exploits/31579 http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0092.html http://www.exploit-db.com/exploits/31579 http://www.osvdb.org/103197 http://www.securityfocus.com/bid/65469 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.5EPSS: 0%CPEs: 126EXPL: 0

Directory traversal vulnerability in TitanFTPd in South River Technologies Titan FTP Server 8.10.1125, and probably earlier versions, allows remote authenticated users to read or delete arbitrary files via "..//" sequences in a COMB command. Vulnerabilidad de salto de directorio en TitanFTPd en South River Technologies Titan FTP Server v8.10.1125, y probablemente versiones anteriores, permite a usuarios autentificados remotamente leer ficheroso borrar ficheros de su elección a través de la secuencia "..//" en el comando COMB. • http://secunia.com/advisories/40237 http://www.osvdb.org/65622 http://www.securityfocus.com/archive/1/511873/100/0/threaded http://www.securityfocus.com/bid/40949 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.0EPSS: 6%CPEs: 126EXPL: 1

Directory traversal vulnerability in TitanFTPd in South River Technologies Titan FTP Server 8.10.1125, and probably earlier versions, allows remote authenticated users to read arbitrary files, determine file size, via "..//" sequences in the xcrc command. Vulnerabilidad de salto de directorio en TitanFTPd en South River Technologies Titan FTP Server v8.10.1125, y probablemente versiones anteriores, permite a usuarios autentificados remotamente leer ficheros de su elección, tamaño de fichero determinado, a través de la secuencia "..//" en el comando xcrc. • http://osvdb.org/65533 http://secunia.com/advisories/40237 http://www.securityfocus.com/archive/1/511839/100/0/threaded http://www.securityfocus.com/bid/40949 https://exchange.xforce.ibmcloud.com/vulnerabilities/59492 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 86%CPEs: 1EXPL: 2

Titan FTP Server 6.26 build 630 allows remote attackers to cause a denial of service (CPU consumption) via the SITE WHO command. Titan FTP Server v6.26 build 630 permite a atacantes remotos provocar una denegación de servicio (consumo de CPU) a través del comando "SITE WHO". The Titan FTP server v6.26 build 630 can be DoSd by issuing "SITE WHO". You need a valid login so you can send this command. • https://www.exploit-db.com/exploits/6753 http://secunia.com/advisories/32269 http://www.osvdb.org/49177 http://www.securityfocus.com/bid/31757 https://exchange.xforce.ibmcloud.com/vulnerabilities/45871 • CWE-399: Resource Management Errors •