CVE-2023-3783 – Webile HTTP POST Request cross site scripting
https://notcve.org/view.php?id=CVE-2023-3783
A vulnerability was found in Webile 1.0.1. It has been classified as problematic. Affected is an unknown function of the component HTTP POST Request Handler. The manipulation of the argument new_file_name/c leads to cross site scripting. It is possible to launch the attack remotely. • https://seclists.org/fulldisclosure/2023/Jul/38 https://vuldb.com/?ctiid.235050 https://vuldb.com/?id.235050 https://www.vulnerability-lab.com/get_content.php?id=2321 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2020-12128
https://notcve.org/view.php?id=CVE-2020-12128
DONG JOO CHO File Transfer iFamily 2.1 allows directory traversal related to the ./etc/ path. DONG JOO CHO File Transfer iFamily versión 2.1 permite salto de directorio relacionado con la ruta ./etc/. • https://www.vulnerability-lab.com/get_content.php?id=2199 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2008-1564 – File Transfer 1.2 - Request File Directory Traversal
https://notcve.org/view.php?id=CVE-2008-1564
Directory traversal vulnerability in Dan Costin File Transfer before 1.2f allows remote attackers to read arbitrary files via a "..\" (dot dot backslash) in the filename. Vulnerabilidad de salto de directorio en Dan Costin File Transfer antes de 1.2f permite a atacantes remotos leer archivos de su elección a través de "..\" (punto punto barra invertida) en el nombre de archivo. • https://www.exploit-db.com/exploits/31536 http://secunia.com/advisories/29540 http://sourceforge.net/project/shownotes.php?group_id=178021&release_id=586923 http://sourceforge.net/tracker/index.php?func=detail&aid=1829601&group_id=178021&atid=883559 http://www.securityfocus.com/bid/28453 https://exchange.xforce.ibmcloud.com/vulnerabilities/41489 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •