etcd-browser version 87ae63d75260 suffers from a directory traversal vulnerability.
8456b0b8489b8c480ad32f464fbe163fc1fe87e4a533e2f02fd020993cf98140
Razer Sila versions 2.0.441_api through 2.0.418 suffer from a command injection vulnerability.
8d4dce671307b0506af35d07cd539a18cb3de819355fd82c5a8446f004bff643
Razer Sila versions 2.0.441_api through 2.0.418 suffer from a local file inclusion vulnerability.
6363e3e4801fa8c1578d66fb8a359d85cf16f7ebcee3a51f79ee9dadf54e6098
QSC Q-SYS Core Manager version 8.2.1 suffers from a TFTP related directory traversal vulnerability.
76bf0314b2878aee4c5683f5b47353493f1439a510c2c3ba7b37d2f9048e5adb
Netgear R6400 suffers from a remote code execution vulnerability.
dc37f508765fd18731309c947c77f4cb7d01525cccdea9c0cc47571fdcb7f589
Lexmark Services Monitor version 2.27.4.0.39 suffers from a directory traversal vulnerability.
c53c0302aae4b649e7aeba4f2bef26ca8ef3a1e6b142720e59503967cffecdfd
An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. Using the MDTM FTP command, a remote attacker can use a directory traversal (..\..\) to browse outside the root directory to determine the existence of a file on the operating system, and the last modified date.
02a55797ad317b26e2c3f852933ef7c93cfeefe8fa481fb85daa30044a0ac1f7
An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. A directory traversal vulnerability exists using the SIZE command along with a \..\..\ substring, allowing an attacker to enumerate file existence based on the returned information.
55d5c601f24989f0cd87c1d30f3e4d2e24da10d2ffdf9b41b6aeffd9d3a3e8cc
DVD X Player version 5.5 Pro suffers from a local buffer overflow vulnerability.
025358a4ff28df7e6401821b90e6962f2406b70bbc38f1a90b7b40ea467f4502
Freefloat FTP Server version 1.0 suffers from a STOR remote buffer overflow vulnerability.
5ace81317af651efd44942f8b4bda80940a213f47e4a743b250a8d4ae5cfb76f
Freefloat FTP Server version 1.0 suffers from a SIZE remote buffer overflow vulnerability.
583fd9120564a7a4274686a33c4957d70e7f4225537eb7b6cd60ae7f8a6491b4
Titan FTP Server 2019 build 3505 suffers from a directory traversal vulnerability.
8e3e98d88206deab4585f5cf3c2e19aaef14d402496a5f04fa0479e7b564ef81
CoreFTP Server FTP and SFTP Server version 2 build 674 suffer from a directory traversal vulnerability. By utilizing a directory traversal along with the FTP MDTM command, an attacker can browse outside the root directory to determine if a file exists based on return file size along with the date the file was last modified by using a ..\..\ technique.
3fc201ddb80ecf5d371328f76f120d416014c22afdf01a082fc0fd2b76a60e8a
CoreFTP Server FTP and SFTP Server version 2 build 674 suffer from a directory traversal vulnerability. By utilizing a directory traversal along with the FTP SIZE command, an attacker can browse outside the root directory to determine if a file exists based on return file size by using a ..\..\ technique.
37bbdbe7891d4945d5ffae270f56ee38468766fc65923b032489c8574e7b1953
D-Link DIR-601 version 2.02NA suffers from a privilege escalation vulnerability.
33474835141701c30736e8087db9ef916d7adae2878081c9250a53fa48299500
An issue was discovered on D-Link DIR-890L A2 devices. Due to the predictability of the /docs/captcha_(number).jpeg URI, being local to the network, but unauthenticated to the administrator's panel, an attacker can disclose the CAPTCHAs used by the access point and can elect to load the CAPTCHA of their choosing, leading to unauthorized login attempts to the access point.
8acb847f07e8c2e49d3d517591f2ed4886971da5555d91abe3f74c0cef383bfe
D-Link DIR-601 suffers from an administrative password disclosure vulnerability.
cf50539f5e3dfb67788edd38d8ba3c2387b46ed16ea384404df01adc959569b7