5 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as problematic was found in Xlightftpd Xlight FTP Server 1.1. This vulnerability affects unknown code of the component Login. The manipulation of the argument user leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://packetstormsecurity.com/files/176553/LightFTP-1.1-Denial-Of-Service.html https://vuldb.com/?ctiid.251560 https://vuldb.com/?id.251560 • CWE-404: Improper Resource Shutdown or Release •

CVSS: 6.8EPSS: 0%CPEs: 33EXPL: 3

Multiple SQL injection vulnerabilities in Xlight FTP Server before 3.2.1, when ODBC authentication is enabled, allow remote attackers to execute arbitrary SQL commands via the (1) USER (aka username) or (2) PASS (aka password) command. Multiples vulnerabilidades de inyección SQL en Xlight FTP Server en versiones anteriores a la v3.2.1, cuando la autenticación ODBC está activada, permite a los usuarios remotos autenticados ejecutar comandos de su elección SQL a través del comando (1) USER (también conocido como username) o (2) PASS (password). • https://www.exploit-db.com/exploits/32877 http://secunia.com/advisories/34513 http://www.securityfocus.com/bid/34288 http://www.xlightftpd.com/forum/viewtopic.php?t=1042 http://www.xlightftpd.com/whatsnew.htm https://exchange.xforce.ibmcloud.com/vulnerabilities/49495 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 0

The LDAP authentication feature in XLight FTP Server before 2.83, when used with some unspecified LDAP servers, does not check for blank passwords, which allows remote attackers to bypass intended access restrictions. La característica de autentificación LDAP en XLight FTP Server en versiones anteriores a 2.83. Cuando se usa con algunos servidores LDAP no especificados, no comprueba que haya contraseñas en blanco, lo que permite a atacantes remotos evitar las pretendidas restricciones de acceso. • http://secunia.com/advisories/28755 http://www.securityfocus.com/bid/27602 http://www.xlightftpd.com/whatsnew.htm • CWE-255: Credentials Management Errors •

CVSS: 5.0EPSS: 9%CPEs: 1EXPL: 1

Xlight FTP server 1.52 allows remote authenticated users to cause a denial of service (crash) via a RETR command with a long argument containing a large number of / (slash) characters, possibly triggering a buffer overflow. El servidor FTP Xlight 1.52 permite a usuarios remotos autenticados causar una denegación de servicio (caída) mediante un comando RETR con un argumento largo, posiblemente disparando un desbordamiento de búfer. • https://www.exploit-db.com/exploits/23701 http://marc.info/?l=bugtraq&m=107695172917263&w=2 http://www.securityfocus.com/bid/9668 https://exchange.xforce.ibmcloud.com/vulnerabilities/15220 •

CVSS: 5.0EPSS: 3%CPEs: 4EXPL: 2

Xlight 1.52, with log to screen enabled, allows remote attackers to cause a denial of service by requesting a long directory consisting of . (dot) and / (slash) characters, which causes the server to crash when the administrator views the log file, possibly triggering a buffer overflow. Xlight 1.52, con registro de mensajes en pantalla activado, permite a atacantes remotos causar una denegación de servicio solicitando un directorio largo consistente en caractéres . (punto) y / (barra), lo que hace que el servidor se caiga cuando el administrador visualiza el fichero de registro, posiblemente disparando un desbordamiento de búfer. • https://www.exploit-db.com/exploits/23654 http://marc.info/?l=bugtraq&m=107605633904122&w=2 http://www.securityfocus.com/bid/9585 https://exchange.xforce.ibmcloud.com/vulnerabilities/15064 •