Page 9 of 51 results (0.006 seconds)

CVSS: 10.0EPSS: 1%CPEs: 6EXPL: 0

NetWin SurgeFTP 2.0f and earlier encrypts passwords using weak hashing, a fixed salt value and modulo 40 calculations, which allows remote attackers to conduct brute force password guessing attacks against the administrator account on port 7021. • http://online.securityfocus.com/archive/1/201951 http://www.iss.net/security_center/static/6961.php http://www.securityfocus.com/bid/3157 •

CVSS: 10.0EPSS: 1%CPEs: 12EXPL: 0

Buffer overflows in NetWin Authentication Module (NWAuth) 3.0b and earlier, as implemented in DMail, SurgeFTP, and possibly other packages, could allow attackers to execute arbitrary code via long arguments to (1) the -del command or (2) the -lookup command. • http://online.securityfocus.com/archive/1/198293 http://www.securityfocus.com/bid/3077 https://exchange.xforce.ibmcloud.com/vulnerabilities/6865 •

CVSS: 4.6EPSS: 0%CPEs: 12EXPL: 2

NetWin Authentication module (NWAuth) 2.0 and 3.0b, as implemented in SurgeFTP, DMail, and possibly other packages, uses weak password hashing, which could allow local users to decrypt passwords or use a different password that has the same hash value as the correct password. • https://www.exploit-db.com/exploits/21020 http://online.securityfocus.com/archive/1/198293 http://www.securityfocus.com/bid/3075 https://exchange.xforce.ibmcloud.com/vulnerabilities/6866 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 2

netauth.cgi program in Netwin Netauth 4.2e and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack. • https://www.exploit-db.com/exploits/20156 http://netwinsite.com/netauth/updates.htm http://www.securityfocus.com/bid/1587 http://www.securityfocus.com/templates/archive.pike?list=1&msg=NEBBJCLKGNOGCOIOBJNAGEHLCPAA.marc%40eeye.com https://exchange.xforce.ibmcloud.com/vulnerabilities/5090 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

NetWin dMailWeb and cwMail 2.6g and earlier allows remote attackers to bypass authentication and use the server for mail relay via a username that contains a carriage return. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0243.html http://www.securityfocus.com/bid/1390 https://exchange.xforce.ibmcloud.com/vulnerabilities/4770 •