Show filters
23 Total Results
Displaying 1-10 of 23
Sort by:
Attacker Value
Unknown
CVE-2024-5052
Disclosure Date: May 17, 2024 (last updated May 17, 2024)
Denial of Service (DoS) vulnerability for Cerberus Enterprise 8.0.10.3 web administration. The vulnerability exists when the web server, default port 10001, attempts to process a large number of incomplete HTTP requests.
0
Attacker Value
Unknown
CVE-2019-25046
Disclosure Date: June 10, 2021 (last updated February 22, 2025)
The Web Client in Cerberus FTP Server Enterprise before 10.0.19 and 11.x before 11.0.4 allows XSS via an SVG document.
0
Attacker Value
Unknown
CVE-2020-5196
Disclosure Date: January 14, 2020 (last updated February 21, 2025)
Cerberus FTP Server Enterprise Edition prior to versions 11.0.3 and 10.0.18 allows an authenticated attacker to create files, display hidden files, list directories, and list files without the permission to zip and download (or unzip and upload) files. There are multiple ways to bypass certain permissions by utilizing the zip and unzip features. As a result, users without permission can see files, folders, and hidden files, and can create directories without permission.
0
Attacker Value
Unknown
CVE-2020-5194
Disclosure Date: January 14, 2020 (last updated February 21, 2025)
The zip API endpoint in Cerberus FTP Server 8 allows an authenticated attacker without zip permission to use the zip functionality via an unrestricted API endpoint. Improper permission verification occurs when calling the file/ajax_download_zip/zip_name endpoint. The result is that a user without permissions can zip and download files even if they do not have permission to view whether the file exists.
0
Attacker Value
Unknown
CVE-2020-5195
Disclosure Date: January 13, 2020 (last updated February 21, 2025)
Reflected XSS through an IMG element in Cerberus FTP Server prior to versions 11.0.1 and 10.0.17 allows a remote attacker to execute arbitrary JavaScript or HTML via a crafted public folder URL. This occurs because of the folder_up.png IMG element not properly sanitizing user-inserted directory paths. The path modification must be done on a publicly shared folder for a remote attacker to insert arbitrary JavaScript or HTML. The vulnerability impacts anyone who clicks the malicious link crafted by the attacker.
0
Attacker Value
Unknown
CVE-2017-6880
Disclosure Date: March 17, 2017 (last updated November 26, 2024)
Buffer overflow in Cerberus FTP Server 8.0.10.3 allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long MLST command.
0
Attacker Value
Unknown
CVE-2017-6367
Disclosure Date: March 14, 2017 (last updated November 26, 2024)
In Cerberus FTP Server 8.0.10.1, a crafted HTTP request causes the Windows service to crash. The attack methodology involves a long Host header and an invalid Content-Length header.
0
Attacker Value
Unknown
CVE-2012-6339
Disclosure Date: December 31, 2012 (last updated October 05, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in the administrative web interface in Cerberus FTP Server before 5.0.6.0 allow (1) remote attackers to inject arbitrary web script or HTML via a log entry that is not properly handled within the Log Manager component, and might allow (2) remote authenticated administrators to inject arbitrary web script or HTML via a Messages field to the servermanager program.
0
Attacker Value
Unknown
CVE-2012-2999
Disclosure Date: October 04, 2012 (last updated October 05, 2023)
Multiple cross-site request forgery (CSRF) vulnerabilities in the web interface in Cerberus FTP Server before 5.0.5.0 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user account or (2) reconfigure the state of the FTP service, as demonstrated by a request to usermanager/users/modify.
0
Attacker Value
Unknown
CVE-2012-5301
Disclosure Date: October 04, 2012 (last updated October 05, 2023)
The default configuration of Cerberus FTP Server before 5.0.4.0 supports the DES cipher for SSH sessions, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and performing a brute-force attack on the encrypted data.
0