Show filters
161 Total Results
Displaying 41-50 of 161
Sort by:
Attacker Value
Unknown

CVE-2019-12144

Disclosure Date: June 11, 2019 (last updated November 27, 2024)
An issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1. Attackers have the ability to abuse a path traversal vulnerability using the SCP protocol. Attackers who leverage this flaw could also obtain remote code execution by crafting a payload that abuses the SITE command feature.
0
Attacker Value
Unknown

CVE-2018-19911

Disclosure Date: December 06, 2018 (last updated November 27, 2024)
FreeSWITCH through 1.8.2, when mod_xml_rpc is enabled, allows remote attackers to execute arbitrary commands via the api/system or txtapi/system (or api/bg_system or txtapi/bg_system) query string on TCP port 8080, as demonstrated by an api/system?calc URI. This can also be exploited via CSRF. Alternatively, the default password of works for the freeswitch account can sometimes be used.
0
Attacker Value
Unknown

CVE-2018-18860

Disclosure Date: November 30, 2018 (last updated November 27, 2024)
A local privilege escalation vulnerability has been identified in the SwitchVPN client 2.1012.03 for macOS. Due to over-permissive configuration settings and a SUID binary, an attacker is able to execute arbitrary binaries as root.
0
Attacker Value
Unknown

CVE-2018-17204

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.
Attacker Value
Unknown

CVE-2018-17206

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.
Attacker Value
Unknown

CVE-2018-17205

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the bundle. While reinserting old flows, OvS has an assertion failure due to a check on rule state != RULE_INITIALIZED. This would work for new flows, but for an old flow the rule state is RULE_REMOVED. The assertion failure causes an OvS crash.
0
Attacker Value
Unknown

CVE-2018-6545

Disclosure Date: February 02, 2018 (last updated November 26, 2024)
Ipswitch MoveIt v8.1 is vulnerable to a Stored Cross-Site Scripting (XSS) vulnerability, as demonstrated by human.aspx. Attackers can leverage this vulnerability to send malicious messages to other users in order to steal session cookies and launch client-side attacks.
0
Attacker Value
Unknown

CVE-2017-16513

Disclosure Date: November 03, 2017 (last updated November 26, 2024)
Ipswitch WS_FTP Professional before 12.6.0.3 has buffer overflows in the local search field and the backup locations field, aka WSCLT-1729.
0
Attacker Value
Unknown

CVE-2017-12639

Disclosure Date: October 03, 2017 (last updated November 26, 2024)
Stack based buffer overflow in Ipswitch IMail server up to and including 12.5.5 allows remote attackers to execute arbitrary code via unspecified vectors in IMmailSrv, aka ETRE or ETCTERARED.
0
Attacker Value
Unknown

CVE-2017-12638

Disclosure Date: October 03, 2017 (last updated November 26, 2024)
Stack based buffer overflow in Ipswitch IMail server up to and including 12.5.5 allows remote attackers to execute arbitrary code via unspecified vectors in IMmailSrv, aka ETBL or ETCETERABLUE.
0