Default file permissions on South River Technologies' Titan MFT and Titan SFTP servers on Linux allows a user that's authentication to the OS to read sensitive files on the filesystem
Max CVSS
4.9
EPSS Score
0.05%
Published
2023-10-16
Updated
2023-10-24
Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Windows and Linux allows an authenticated attacker with administrative privileges to read any file on the filesystem via path traversal
Max CVSS
6.5
EPSS Score
0.05%
Published
2023-10-16
Updated
2023-10-24
Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to get the size of an arbitrary file on the filesystem using path traversal in the ftp "SIZE" command
Max CVSS
4.3
EPSS Score
0.05%
Published
2023-10-16
Updated
2023-10-24
A session fixation vulnerability in South River Technologies' Titan MFT and Titan SFTP servers on Linux and Windows allows an attacker to bypass the server's authentication if they can trick an administrator into authorizating a session id of their choosing
Max CVSS
8.8
EPSS Score
0.09%
Published
2023-10-16
Updated
2023-10-24
Insufficient path validation when writing a file via WebDAV in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to write a file to any location on the filesystem via path traversal
Max CVSS
7.2
EPSS Score
0.05%
Published
2023-10-16
Updated
2023-10-24
Insufficient path validation when extracting a zip archive in South River Technologies' Titan MFT and Titan SFTP servers on Windows and Linux allows an authenticated attacker to write a file to any location on the filesystem via path traversal
Max CVSS
9.1
EPSS Score
0.05%
Published
2023-10-16
Updated
2023-10-24
An issue in South River Technologies TitanFTP Before v2.0.1.2102 allows attackers with low-level privileges to perform Administrative actions by sending requests to the user server.
Max CVSS
8.8
EPSS Score
0.05%
Published
2023-06-02
Updated
2023-06-09
An issue was discovered in South River Technologies TitanFTP NextGen server that allows for a vertical privilege escalation leading to remote code execution.
Max CVSS
7.8
EPSS Score
0.08%
Published
2023-06-02
Updated
2023-06-09
An issue was discovered in TitanFTP through 1.94.1205. The move-file function has a path traversal vulnerability in the newPath parameter. An authenticated attacker can upload any file and then move it anywhere on the server's filesystem.
Max CVSS
8.8
EPSS Score
0.41%
Published
2023-02-14
Updated
2023-04-06
There is an open redirect vulnerability in Titan FTP server 19.0 and below. Users are redirected to any target URL.
Max CVSS
6.1
EPSS Score
0.05%
Published
2023-08-22
Updated
2023-08-28
An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. When installing, Microsoft SQL Express 2019 installs by default with an SQL instance running as SYSTEM with BUILTIN\Users as sysadmin, thus enabling unprivileged Windows users to execute commands locally as NT AUTHORITY\SYSTEM, aka NX-I674 (sub-issue 2). NOTE: as of 2022-06-21, the 1.2.1050 release corrects this vulnerability in a new installation, but not in an upgrade installation.
Max CVSS
7.8
EPSS Score
0.04%
Published
2022-06-19
Updated
2022-06-29
An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. There is Remote Code Execution due to a hardcoded password for the sa account on the Microsoft SQL Express 2019 instance installed by default during TitanFTP NextGen installation, aka NX-I674 (sub-issue 1). NOTE: as of 2022-06-21, the 1.2.1050 release corrects this vulnerability in a new installation, but not in an upgrade installation.
Max CVSS
9.8
EPSS Score
0.44%
Published
2022-06-19
Updated
2022-06-29
A Directory Traversal issue was discovered in the Web GUI in Titan FTP Server 2019 Build 3505. When an authenticated user attempts to preview an uploaded file (through PreviewHandler.ashx) by using a \..\..\ technique, arbitrary files can be loaded in the server response outside the root directory.
Max CVSS
6.5
EPSS Score
3.40%
Published
2019-06-03
Updated
2019-06-06
Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to obtain the property information of an arbitrary home folder via a Properties action with a .. (dot dot) in the src parameter.
Max CVSS
5.0
EPSS Score
0.43%
Published
2014-04-29
Updated
2015-07-29
Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to list all usernames via a Go action with a .. (dot dot) in the search-bar value.
Max CVSS
5.0
EPSS Score
0.57%
Published
2014-04-29
Updated
2015-07-29
Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to copy an arbitrary user's home folder via a Move action with a .. (dot dot) in the src parameter.
Max CVSS
5.0
EPSS Score
0.34%
Published
2014-04-29
Updated
2015-07-29

CVE-2010-2426

Public exploit
Directory traversal vulnerability in TitanFTPd in South River Technologies Titan FTP Server 8.10.1125, and probably earlier versions, allows remote authenticated users to read arbitrary files, determine file size, via "..//" sequences in the xcrc command.
Max CVSS
4.0
EPSS Score
7.25%
Published
2010-06-24
Updated
2018-10-10
Directory traversal vulnerability in TitanFTPd in South River Technologies Titan FTP Server 8.10.1125, and probably earlier versions, allows remote authenticated users to read or delete arbitrary files via "..//" sequences in a COMB command.
Max CVSS
6.5
EPSS Score
0.36%
Published
2010-06-24
Updated
2018-10-10

CVE-2008-6082

Public exploit
Titan FTP Server 6.26 build 630 allows remote attackers to cause a denial of service (CPU consumption) via the SITE WHO command.
Max CVSS
5.0
EPSS Score
86.61%
Published
2009-02-06
Updated
2017-09-29
19 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!