Vulnerabilities
Vulnerable Software
Coreftp:  Security Vulnerabilities
Multiple heap-based buffer overflows in the client in Core FTP LE 2.2 build 1798 allow remote FTP servers to cause a denial of service (application crash) and possibly execute arbitrary code via a long string in a reply to a (1) USER, (2) PASS, (3) PASV, (4) SYST, (5) PWD, or (6) CDUP command.
CVSS Score
5.0
EPSS Score
0.224
Published
2014-06-25
Core FTP Server 1.2 before build 515 allows remote attackers to cause a denial of service (reachable assertion and crash) via an AUTH SSL command with malformed data, as demonstrated by pressing the enter key twice.
CVSS Score
4.3
EPSS Score
0.004
Published
2014-05-02
Directory traversal vulnerability in Core FTP Server 1.2 before build 515 allows remote authenticated users to determine the existence of arbitrary files via a /../ sequence in an XCRC command.
CVSS Score
4.0
EPSS Score
0.003
Published
2014-05-02
Core FTP Server 1.2 before build 515 allows remote authenticated users to obtain sensitive information (password for the previous user) via a USER command with a specific length, possibly related to an out-of-bounds read.
CVSS Score
4.0
EPSS Score
0.003
Published
2014-05-02
Stack-based buffer overflow in Core FTP before 2.2 build 1785 allows remote FTP servers to execute arbitrary code via a crafted directory name in a CWD command reply.
CVSS Score
9.3
EPSS Score
0.02
Published
2014-04-04
Multiple buffer overflows in Core FTP before 2.2 build 1769 allow remote FTP servers to execute arbitrary code or cause a denial of service (application crash) via a long directory name in a (1) DELE, (2) LIST, or (3) VIEW command.
CVSS Score
5.1
EPSS Score
0.008
Published
2013-03-29
Stack-based buffer overflow in Core FTP 2.1 build 1612 allows user-assisted remote attackers to execute arbitrary code via a long hostname in an FTP server entry in a site backup file. NOTE: some of these details are obtained from third party information.
CVSS Score
9.3
EPSS Score
0.074
Published
2009-09-30


Contact Us

Shodan ® - All rights reserved