Weak access control in Wing FTP Server (Admin Web Client) allows for privilege escalation.This issue affects Wing FTP Server: <= 7.2.0.
Max CVSS
8.8
EPSS Score
0.05%
Published
2023-09-12
Updated
2023-09-15
Insecure storage of sensitive information in Wing FTP Server (User Web Client) allows information elicitation.This issue affects Wing FTP Server: <= 7.2.0.
Max CVSS
7.5
EPSS Score
0.09%
Published
2023-09-12
Updated
2023-09-15
Insecure default permissions in Wing FTP Server (Admin Web Client) allows for privilege escalation.This issue affects Wing FTP Server: <= 7.2.0.
Max CVSS
8.8
EPSS Score
0.05%
Published
2023-09-12
Updated
2023-09-14
Improper encoding or escaping of output in Wing FTP Server (User Web Client) allows Cross-Site Scripting (XSS).This issue affects Wing FTP Server: <= 7.2.0.
Max CVSS
5.4
EPSS Score
0.05%
Published
2023-09-12
Updated
2023-09-14
An XSS issue was discovered in Wing FTP 6.4.4. An arbitrary IFRAME element can be included in the help pages via a crafted link, leading to the execution of (sandboxed) arbitrary HTML and JavaScript in the user's browser.
Max CVSS
6.1
EPSS Score
0.23%
Published
2021-01-26
Updated
2021-02-02
An issue was discovered in Wing FTP Server 6.2.5 before February 2020. Due to insecure permissions when handling session cookies, a local user may view the contents of the session and session_admin directories, which expose active session cookies within the Wing FTP HTTP interface and administration panel. These cookies may be used to hijack user and administrative sessions, including the ability to execute Lua commands as root within the administration panel.
Max CVSS
7.8
EPSS Score
0.04%
Published
2020-03-07
Updated
2021-07-21
Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions on installation directories and configuration files. This allows local users to arbitrarily create FTP users with full privileges, and escalate privileges within the operating system by modifying system files.
Max CVSS
7.8
EPSS Score
0.04%
Published
2020-03-07
Updated
2021-07-21
Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions on files modified within the HTTP file management interface, resulting in files being saved with world-readable and world-writable permissions. If a sensitive system file were edited this way, a low-privilege user may escalate privileges to root.
Max CVSS
7.8
EPSS Score
0.05%
Published
2020-03-07
Updated
2020-03-09
Multiple cross-site request forgery (CSRF) vulnerabilities in Wing FTP Server before 4.4.7 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code via a crafted request to admin_lua_script.html or (2) add a domain administrator via a crafted request to admin_addadmin.html.
Max CVSS
6.8
EPSS Score
4.13%
Published
2015-06-10
Updated
2018-10-09
Wing FTP Server before 4.1.1 allows remote authenticated users to cause a denial of service (daemon crash) via two zip commands.
Max CVSS
6.8
EPSS Score
0.38%
Published
2012-10-26
Updated
2013-03-02
Cross-site scripting (XSS) vulnerability in admin_loginok.html in the Administrator web interface in Wing FTP Server for Windows 3.5.0 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted POST request.
Max CVSS
4.3
EPSS Score
2.59%
Published
2010-06-24
Updated
2017-08-17
Stack-based buffer overflow in WFTPSRV.exe in WinFTP 2.3.0 allows remote authenticated users to execute arbitrary code via a long LIST argument beginning with an * (asterisk) character.
Max CVSS
9.0
EPSS Score
32.04%
Published
2009-01-29
Updated
2017-09-29

CVE-2008-5666

Public exploit
WinFTP FTP Server 2.3.0, when passive (aka PASV) mode is used, allows remote authenticated users to cause a denial of service via a sequence of FTP sessions that include an invalid "NLST -1" command.
Max CVSS
3.5
EPSS Score
11.34%
Published
2008-12-19
Updated
2017-09-29
13 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!