Page 4 of 20 results (0.004 seconds)

CVSS: 6.4EPSS: 5%CPEs: 1EXPL: 1

Buffer overflow in FileZilla FTP Server 2.2.22 allows remote authenticated attackers to cause a denial of service and possibly execute arbitrary code via a long (1) PORT or (2) PASS followed by the MLSD command, or (2) the remote server interface, as demonstrated by the Infigo FTPStress Fuzzer. Desbordamiento de búfer en FileZilla FTP Server 2.2.22 permite a atacantes remotos autenticados provocar una denegación de servicio y posiblemente ejecutar código arbitrario a través de un (1) PORT o (2) PASS largo seguido por el comando MLSD, o (2) la interfaz del servidor remoto, según lo demostrado por el Infigo FTPStress Fuzzer. • http://archives.neohapsis.com/archives/bugtraq/2006-05/0139.html http://marc.info/?l=bugtraq&m=114658586018818&w=2 http://www.infigo.hr/en/in_focus/tools http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-05-03 http://www.osvdb.org/25221 http://www.securityfocus.com/bid/17802 https://exchange.xforce.ibmcloud.com/vulnerabilities/26303 •

CVSS: 7.8EPSS: 59%CPEs: 1EXPL: 1

Buffer overflow in FileZilla Server Terminal 0.9.4d may allow remote attackers to cause a denial of service (terminal crash) via a long USER ftp command. • https://www.exploit-db.com/exploits/1336 http://ingehenriksen.blogspot.com/2005/11/filezilla-server-terminal-094d-dos-poc_21.html http://ingehenriksen.blogspot.com/2005/11/work-in-progress-filezilla-server.html http://marc.info/?l=bugtraq&m=113140190521377&w=2 http://sourceforge.net/project/shownotes.php?release_id=298735 http://www.osvdb.org/20817 http://www.securityfocus.com/archive/1/417307/30/0/threaded http://www.securityfocus.com/bid/15346 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 2

NOTE: this issue has been disputed by the vendor. FileZilla 2.2.14b and 2.2.15, and possibly earlier versions, when "Use secure mode" is disabled, uses a weak encryption scheme to store the user's password in the configuration settings file, which allows local users to obtain sensitive information. NOTE: the vendor has disputed the issue, stating that "the problem is not a vulnerability at all, but in fact a fundamental issue of every single program that can store passwords transparently. • https://www.exploit-db.com/exploits/26220 http://filezilla.sourceforge.net/forum/viewtopic.php?t=1328 http://marc.info/?l=bugtraq&m=112577523810442&w=2 http://marc.info/?l=bugtraq&m=112605448327521&w=2 http://www.securityfocus.com/bid/14730 https://exchange.xforce.ibmcloud.com/vulnerabilities/22135 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

FileZilla FTP server before 0.9.6, when using MODE Z (zlib compression), allows remote attackers to cause a denial of service (infinite loop) via certain file uploads or directory listings. • http://sourceforge.net/project/shownotes.php?group_id=21558&release_id=314473 http://www.securityfocus.com/bid/12865 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

FileZilla FTP server before 0.9.6 allows remote attackers to cause a denial of service via a request for a filename containing an MS-DOS device name such as CON, NUL, COM1, LPT1, and others. • http://sourceforge.net/project/shownotes.php?group_id=21558&release_id=314473 http://www.securityfocus.com/bid/12865 • CWE-20: Improper Input Validation •