Show filters
52 Total Results
Displaying 11-20 of 52
Sort by:
Attacker Value
Unknown

CVE-2023-40045

Disclosure Date: September 27, 2023 (last updated October 08, 2023)
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a reflected cross-site scripting (XSS) vulnerability exists in WS_FTP Server's Ad Hoc Transfer module.  An attacker could leverage this vulnerability to target WS_FTP Server users with a specialized payload which results in the execution of malicious JavaScript within the context of the victims browser.
Attacker Value
Unknown

CVE-2022-27665

Disclosure Date: April 03, 2023 (last updated October 12, 2023)
Reflected XSS (via AngularJS sandbox escape expressions) exists in Progress Ipswitch WS_FTP Server 8.6.0. This can lead to execution of malicious code and commands on the client due to improper handling of user-provided input. By inputting malicious payloads in the subdirectory searchbar or Add folder filename boxes, it is possible to execute client-side commands. For example, there is Client-Side Template Injection via subFolderPath to the ThinClient/WtmApiService.asmx/GetFileSubTree URI.
Attacker Value
Unknown

CVE-2023-24029

Disclosure Date: February 03, 2023 (last updated October 08, 2023)
In Progress WS_FTP Server before 8.8, it is possible for a host administrator to elevate their privileges via the administrative interface due to insufficient authorization controls applied on user modification workflows.
Attacker Value
Unknown

CVE-2022-36968

Disclosure Date: August 02, 2022 (last updated October 08, 2023)
In Progress WS_FTP Server prior to version 8.7.3, forms within the administrative interface did not include a nonce to mitigate the risk of cross-site request forgery (CSRF) attacks.
Attacker Value
Unknown

CVE-2022-36967

Disclosure Date: August 02, 2022 (last updated October 08, 2023)
In Progress WS_FTP Server prior to version 8.7.3, multiple reflected cross-site scripting (XSS) vulnerabilities exist in the administrative web interface. It is possible for a remote attacker to inject arbitrary JavaScript into a WS_FTP administrator's web session. This would allow the attacker to execute code within the context of the victim's browser.
Attacker Value
Unknown

CVE-2019-12145

Disclosure Date: June 11, 2019 (last updated November 27, 2024)
A Directory Traversal issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1. An attacker can supply a string using special patterns via the SCP protocol to disclose path names on the host operating system.
0
Attacker Value
Unknown

CVE-2019-12146

Disclosure Date: June 11, 2019 (last updated November 27, 2024)
A Directory Traversal issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1. Attackers have the ability to abuse a flaw in the SCP listener by crafting strings using specific patterns to write files and create directories outside of their authorized directory.
0
Attacker Value
Unknown

CVE-2019-12144

Disclosure Date: June 11, 2019 (last updated November 27, 2024)
An issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1. Attackers have the ability to abuse a path traversal vulnerability using the SCP protocol. Attackers who leverage this flaw could also obtain remote code execution by crafting a payload that abuses the SITE command feature.
0
Attacker Value
Unknown

CVE-2019-12143

Disclosure Date: June 11, 2019 (last updated October 12, 2023)
A Directory Traversal issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1. An attacker can supply a string using special patterns via the SCP protocol to disclose WS_FTP usernames as well as filenames.
0
Attacker Value
Unknown

CVE-2017-16513

Disclosure Date: November 03, 2017 (last updated November 26, 2024)
Ipswitch WS_FTP Professional before 12.6.0.3 has buffer overflows in the local search field and the backup locations field, aka WSCLT-1729.
0