Show filters
161 Total Results
Displaying 41-50 of 161
Sort by:
Attacker Value
Unknown
CVE-2019-12144
Disclosure Date: June 11, 2019 (last updated November 27, 2024)
An issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1. Attackers have the ability to abuse a path traversal vulnerability using the SCP protocol. Attackers who leverage this flaw could also obtain remote code execution by crafting a payload that abuses the SITE command feature.
0
Attacker Value
Unknown
CVE-2018-19911
Disclosure Date: December 06, 2018 (last updated November 27, 2024)
FreeSWITCH through 1.8.2, when mod_xml_rpc is enabled, allows remote attackers to execute arbitrary commands via the api/system or txtapi/system (or api/bg_system or txtapi/bg_system) query string on TCP port 8080, as demonstrated by an api/system?calc URI. This can also be exploited via CSRF. Alternatively, the default password of works for the freeswitch account can sometimes be used.
0
Attacker Value
Unknown
CVE-2018-18860
Disclosure Date: November 30, 2018 (last updated November 27, 2024)
A local privilege escalation vulnerability has been identified in the SwitchVPN client 2.1012.03 for macOS. Due to over-permissive configuration settings and a SUID binary, an attacker is able to execute arbitrary binaries as root.
0
Attacker Value
Unknown
CVE-2018-17204
Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.
0
Attacker Value
Unknown
CVE-2018-17206
Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.
0
Attacker Value
Unknown
CVE-2018-17205
Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the bundle. While reinserting old flows, OvS has an assertion failure due to a check on rule state != RULE_INITIALIZED. This would work for new flows, but for an old flow the rule state is RULE_REMOVED. The assertion failure causes an OvS crash.
0
Attacker Value
Unknown
CVE-2018-6545
Disclosure Date: February 02, 2018 (last updated November 26, 2024)
Ipswitch MoveIt v8.1 is vulnerable to a Stored Cross-Site Scripting (XSS) vulnerability, as demonstrated by human.aspx. Attackers can leverage this vulnerability to send malicious messages to other users in order to steal session cookies and launch client-side attacks.
0
Attacker Value
Unknown
CVE-2017-16513
Disclosure Date: November 03, 2017 (last updated November 26, 2024)
Ipswitch WS_FTP Professional before 12.6.0.3 has buffer overflows in the local search field and the backup locations field, aka WSCLT-1729.
0
Attacker Value
Unknown
CVE-2017-12639
Disclosure Date: October 03, 2017 (last updated November 26, 2024)
Stack based buffer overflow in Ipswitch IMail server up to and including 12.5.5 allows remote attackers to execute arbitrary code via unspecified vectors in IMmailSrv, aka ETRE or ETCTERARED.
0
Attacker Value
Unknown
CVE-2017-12638
Disclosure Date: October 03, 2017 (last updated November 26, 2024)
Stack based buffer overflow in Ipswitch IMail server up to and including 12.5.5 allows remote attackers to execute arbitrary code via unspecified vectors in IMmailSrv, aka ETBL or ETCETERABLUE.
0