4 results (0.007 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Easy File Sharing FTP Server version 3.6 is vulnerable to a directory traversal vulnerability which allows an attacker to list and download any file from any folder outside the FTP root Directory. Easy File Sharing FTP Server versión 3.6 es vulnerable a una vulnerabilidad de salto de directorio, lo que permite a un atacante listar y descargar cualquier archivo de cualquier carpeta fuera del root FTP Directory. • http://www.securityfocus.com/bid/96944 https://www.rapid7.com/db/modules/auxiliary/scanner/ftp/easy_file_sharing_ftp • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in Easy File Sharing Web Server 6.8 allows remote attackers to inject arbitrary web script or HTML via the username field during registration, which is not properly handled by forum.ghp. Vulnerabilidad de XSS en Easy File Sharing Web Server 6.8 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del campo de nombre de usuario durante la registración, lo que no se maneja correctamente en forum.ghp. • https://www.exploit-db.com/exploits/35626 http://www.exploit-db.com/exploits/35626 https://exchange.xforce.ibmcloud.com/vulnerabilities/99532 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in Easy File Sharing (EFS) Web Server 6.8 allow remote authenticated users to inject arbitrary web script or HTML via the content parameter when (1) creating a topic or (2) posting an answer. NOTE: some of these details are obtained from third party information. Múltiples vulnerabilidades de XSS en Easy File Sharing (EFS) Web Server 6.8 permiten a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro content cuando (1) crea un tema o (2) publica una respuesta. NOTA: algunos de estos datos se obtienen de información de terceras partes. • http://packetstormsecurity.com/files/127622/Easy-File-Sharing-Persistent-Cross-Site-Scripting.html http://secunia.com/advisories/60524 http://www.securityfocus.com/archive/1/532897/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/94887 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 96%CPEs: 1EXPL: 4

Stack-based buffer overflow in Easy File Sharing (EFS) Web Server 6.8 allows remote attackers to execute arbitrary code via a long string in a cookie UserID parameter to vfolder.ghp. Desbordamiento de buffer basado en pila en Easy File Sharing (EFS) Web Server 6.8 permite a atacantes remotos ejecutar código arbitrario a través de una cadena larga en un parámetro cookie UserID hacia vfolder.ghp. • https://www.exploit-db.com/exploits/33352 http://blog.techorganic.com/2014/05/14/from-fuzzing-to-0-day http://osvdb.org/show/osvdb/106965 http://packetstormsecurity.com/files/126614/Easy-File-Sharing-Web-Server-6.8-Buffer-Overflow.html http://www.exploit-db.com/exploits/33352 http://www.securityfocus.com/bid/67406 http://www.cnnvd.org.cn/vulnerability/show/cv_id/2014050536 http://www.web-file-management.com • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •