Stack-based buffer overflow in Core FTP 2.1 build 1612 allows user-assisted remote attackers to execute arbitrary code via a long hostname in an FTP server entry in a site backup file. NOTE: some of these details are obtained from third party information.
7.9AI Score
0.078EPSS
Stack-based buffer overflow in Core FTP before 2.2 build 1785 allows remote FTP servers to execute arbitrary code via a crafted directory name in a CWD command reply.
8.2AI Score
0.014EPSS
Multiple buffer overflows in Core FTP Server before 1.2 build 508 allow local users to gain privileges via vectors related to reading data from config.dat and Windows Registry.
7.8CVSS
7.5AI Score
0.0004EPSS
Core FTP Server 1.2 before build 515 allows remote attackers to cause a denial of service (reachable assertion and crash) via an AUTH SSL command with malformed data, as demonstrated by pressing the enter key twice.
6.9AI Score
0.017EPSS
Directory traversal vulnerability in Core FTP Server 1.2 before build 515 allows remote authenticated users to determine the existence of arbitrary files via a /../ sequence in an XCRC command.
6.5AI Score
0.004EPSS
Core FTP Server 1.2 before build 515 allows remote authenticated users to obtain sensitive information (password for the previous user) via a USER command with a specific length, possibly related to an out-of-bounds read.
6.1AI Score
0.003EPSS
Multiple heap-based buffer overflows in the client in Core FTP LE 2.2 build 1798 allow remote FTP servers to cause a denial of service (application crash) and possibly execute arbitrary code via a long string in a reply to a (1) USER, (2) PASS, (3) PASV, (4) SYST, (5) PWD, or (6) CDUP command.
8.1AI Score
0.013EPSS
Core FTP LE version 2.2 Build 1921 is prone to a buffer overflow vulnerability that may result in a DoS or remote code execution via a PASV response.
9.8CVSS
9.9AI Score
0.108EPSS
The server in Core FTP 2.0 build 653 on 32-bit platforms allows remote attackers to cause a denial of service (daemon crash) via a crafted XRMD command.
7.5CVSS
7.2AI Score
0.092EPSS
An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. A directory traversal vulnerability exists using the SIZE command along with a ....\ substring, allowing an attacker to enumerate file existence based on the returned information.
5.3CVSS
5.1AI Score
0.043EPSS
An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. Using the MDTM FTP command, a remote attacker can use a directory traversal technique (....) to browse outside the root directory to determine the existence of a file on the operating system, and its last modified date.
5.3CVSS
5.1AI Score
0.091EPSS
Buffer overflow vulnerability in Core FTP Server v2 Build 697, via a crafted username.
7.5CVSS
7.5AI Score
0.001EPSS
Buffer overflow vulnerability in Core FTP Server v1.2 Build 583, via a crafted username.
9.8CVSS
9.3AI Score
0.004EPSS
Buffer overflow in Core FTP LE v2.2 allows local attackers to cause a denial or service (crash) via a long string in the Setup->Users->Username editbox.
5.5CVSS
5.5AI Score
0.0004EPSS
CoreFTP Server before 727 allows directory traversal (for file creation) by an authenticated attacker via ../ in an HTTP PUT request.
6.5CVSS
6.4AI Score
0.006EPSS
Core FTP / SFTP Server v2 Build 725 was discovered to allow unauthenticated attackers to cause a Denial of Service (DoS) via a crafted packet through the SSH service.
5.5CVSS
5.5AI Score
0.001EPSS