wftpserver Wing FTP Server 4.1.1

CPE Details

wftpserver Wing FTP Server 4.1.1
4.1.1
2020-03-12
17h23 +00:00
2020-03-12
17h23 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:wftpserver:wing_ftp_server:4.1.1:*:*:*:*:*:*:*

Informations

Vendor

wftpserver

Product

wing_ftp_server

Version

4.1.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-37875 2023-09-12 08h17 +00:00 Improper encoding or escaping of output in Wing FTP Server (User Web Client) allows Cross-Site Scripting (XSS).This issue affects Wing FTP Server: <= 7.2.0.
5.4
Medium
CVE-2023-37878 2023-09-12 08h16 +00:00 Insecure default permissions in Wing FTP Server (Admin Web Client) allows for privilege escalation.This issue affects Wing FTP Server: <= 7.2.0.
8.8
High
CVE-2023-37879 2023-09-12 08h15 +00:00 Insecure storage of sensitive information in Wing FTP Server (User Web Client) allows information elicitation.This issue affects Wing FTP Server: <= 7.2.0.
7.5
High
CVE-2023-37881 2023-09-12 08h14 +00:00 Weak access control in Wing FTP Server (Admin Web Client) allows for privilege escalation.This issue affects Wing FTP Server: <= 7.2.0.
8.8
High
CVE-2020-9470 2020-03-06 23h20 +00:00 An issue was discovered in Wing FTP Server 6.2.5 before February 2020. Due to insecure permissions when handling session cookies, a local user may view the contents of the session and session_admin directories, which expose active session cookies within the Wing FTP HTTP interface and administration panel. These cookies may be used to hijack user and administrative sessions, including the ability to execute Lua commands as root within the administration panel.
7.8
High
CVE-2015-4108 2015-06-10 16h00 +00:00 Multiple cross-site request forgery (CSRF) vulnerabilities in Wing FTP Server before 4.4.7 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code via a crafted request to admin_lua_script.html or (2) add a domain administrator via a crafted request to admin_addadmin.html.
6.8