Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Core_ftp
(Coreftp)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 16 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-04-02 | CVE-2020-21588 | Buffer overflow in Core FTP LE v2.2 allows local attackers to cause a denial or service (crash) via a long string in the Setup->Users->Username editbox. | Core_ftp | 5.5 | ||
2021-04-05 | CVE-2020-19595 | Buffer overflow vulnerability in Core FTP Server v2 Build 697, via a crafted username. | Core_ftp | 7.5 | ||
2021-04-05 | CVE-2020-19596 | Buffer overflow vulnerability in Core FTP Server v1.2 Build 583, via a crafted username. | Core_ftp | 9.8 | ||
2022-01-10 | CVE-2022-22836 | CoreFTP Server before 727 allows directory traversal (for file creation) by an authenticated attacker via ../ in an HTTP PUT request. | Core_ftp | 6.5 | ||
2022-02-17 | CVE-2022-22899 | Core FTP / SFTP Server v2 Build 725 was discovered to allow unauthenticated attackers to cause a Denial of Service (DoS) via a crafted packet through the SSH service. | Core_ftp | 5.5 | ||
2019-03-22 | CVE-2019-9649 | An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. Using the MDTM FTP command, a remote attacker can use a directory traversal technique (..\..\) to browse outside the root directory to determine the existence of a file on the operating system, and its last modified date. | Core_ftp | 5.3 | ||
2019-03-22 | CVE-2019-9648 | An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. A directory traversal vulnerability exists using the SIZE command along with a \..\..\ substring, allowing an attacker to enumerate file existence based on the returned information. | Core_ftp | 5.3 | ||
2019-01-02 | CVE-2018-20658 | The server in Core FTP 2.0 build 653 on 32-bit platforms allows remote attackers to cause a denial of service (daemon crash) via a crafted XRMD command. | Core_ftp | 7.5 | ||
2018-07-05 | CVE-2018-12113 | Core FTP LE version 2.2 Build 1921 is prone to a buffer overflow vulnerability that may result in a DoS or remote code execution via a PASV response. | Core_ftp | 9.8 | ||
2014-06-25 | CVE-2014-4643 | Multiple heap-based buffer overflows in the client in Core FTP LE 2.2 build 1798 allow remote FTP servers to cause a denial of service (application crash) and possibly execute arbitrary code via a long string in a reply to a (1) USER, (2) PASS, (3) PASV, (4) SYST, (5) PWD, or (6) CDUP command. | Core_ftp | N/A |