Page 4 of 18 results (0.004 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

ArGoSoft FTP before 1.4.2.1 generates an error message if the user name does not exist instead of prompting for a password, which allows remote attackers to determine valid usernames. • http://marc.info/?l=bugtraq&m=110451582011666&w=2 http://secunia.com/advisories/13063 http://securitytracker.com/id?1012744 http://www.argosoft.com/ftpserver/changelist.aspx http://www.lovebug.org/argosoft_advisory.txt http://www.osvdb.org/11335 http://www.securityfocus.com/bid/12139 https://exchange.xforce.ibmcloud.com/vulnerabilities/18721 • CWE-203: Observable Discrepancy •

CVSS: 7.5EPSS: 0%CPEs: 12EXPL: 0

ArGoSoft FTP 1.4.2.4 and earlier does not limit the number of times that a bad password can be entered, which makes it easier for remote attackers to guess passwords via a brute force attack. • http://marc.info/?l=bugtraq&m=110451582011666&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/18722 •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

Directory traversal vulnerability in ArGoSoft FTP Server before 1.4.1.6 allows remote authenticated users to determine the existence of arbitrary files via ".." sequences in the SITE UNZIP argument. • http://secunia.com/advisories/11002 http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx http://www.osvdb.org/11333 http://www.securiteam.com/windowsntfocus/5RP010KCAO.html http://www.securityfocus.com/bid/9770 https://exchange.xforce.ibmcloud.com/vulnerabilities/15411 •