193818 | CrushFTP < 10.7.1 / 11.x < 11.1.0 Sandbox Escape (CVE-2024-4040) | critical |
193517 | SolarWinds Serv-U < 15.4.2 Directory Traversal (CVE-2024-28073) | high |
193484 | SolarWinds Serv-U 15.4.1.0 < 15.4.2 | high |
189824 | Progress WS_FTP Server < 8.7.6, 8.8.x < 8.8.4 Arbitrary File Upload | high |
186585 | SolarWinds Serv-U 15.4 < 15.4.1 | medium |
182522 | Progress WS_FTP Server < 8.8.2 Multiple Vulnerabilities | medium |
182521 | Progress WS_FTP Server < 8.7.4, 8.8.0 < 8.8.2 Multiple Vulnerabilities | critical |
181182 | SolarWinds Serv-U 15.4 < 15.4 HF2 Authentication Bypass | high |
179953 | SolarWinds Serv-U 15.4 Access Control (CVE-2023-35179) | high |
177841 | GlobalSCAPE EFT Recursive Deflate Stream DoS (CVE-2023-2990) | high |
177840 | Globalscape FTP Server Detection | info |
177024 | SolarWinds Serv-U < 15.4 Exposure of Sensitive Information (CVE-2023-23841) | high |
176736 | Progress MOVEit Transfer FTP Detection | info |
174448 | SolarWinds Serv-U 15.3 HF1 | high |
169899 | SolarWinds Serv-U < 15.3.0 Common Key (CVE-2021-35252) | high |
156886 | Serv-U FTP Server < 15.3 Improper Input Validation | medium |
156115 | Apache Log4Shell RCE detection via callback correlation (Direct Check FTP) | critical |
151646 | Serv-U FTP Server <= 15.2.3 Hotfix 1 Memory Escape Vulnerability | critical |
146308 | Serv-U FTP Server < 15.2.2 Hotfix 1 Arbitrary File Read/Write | high |
132749 | ProFTPD 'mod_copy' Arbitrary File Copy Vulnerability (Remote) | critical |
106756 | ProFTPD < 1.3.5e / 1.3.6x < 1.3.6rc5 AllowChrootSymlinks bypass | medium |
106755 | ProFTPD < 1.3.5b / 1.3.6x < 1.3.6rc2 weak Diffie-Hellman key | high |
106754 | ProFTPD 1.3.4d / 1.3.5rc3 Denial of Service | medium |
106753 | ProFTPD < 1.3.4rc2 client-hostname restriction bypass | medium |
106752 | ProFTPD < 1.3.2b / 1.3.3x < 1.3.3rc2 client-hostname restriction bypass | medium |
106751 | ProFTPD < 1.3.2rc3 ABOR Denial of Service | medium |
106750 | ProFTPD 1.3.1 SQL injection protection bypass | high |
101547 | Foscam C1 IP Camera FTP Hard Coded Password | critical |
90765 | Core FTP Server < 1.2 Build 588 32-bit Unspecified Overflow Vulnerability | critical |
86905 | Janitza Hard-Coded FTP Password | critical |
84215 | ProFTPD mod_copy Information Disclosure | critical |
77986 | GNU Bash Environment Variable Handling Code Injection via ProFTPD (Shellshock) | critical |
77004 | Cerberus FTP Server 6.x < 6.0.10.0 / 7.x < 7.0.0.3 Multiple OpenSSL Vulnerabilities | medium |
76459 | Cerberus FTP Server 6.x < 6.0.9.0 / 7.x < 7.0.0.2 SSH FTP Account Enumeration | medium |
76369 | Serv-U FTP Server < 15.1.0.458 Multiple Vulnerabilities | medium |
73270 | Cerberus FTP Server < 5.0.8.0 / 6.x < 6.0.7.0 Web Client Security Bypass | medium |
73188 | Default FTP Credentials (ntpupdate / ntpupdate) | critical |
72662 | Core FTP Server < 1.2 Build 515 Multiple Vulnerabilities | medium |
72661 | Core FTP Server < 1.2 Build 508 lstrcpy Overflow Code Execution | high |
72660 | Core FTP Server Detection | info |
72658 | Serv-U FTP Server < 15.0.1.20 DoS | medium |
71863 | Serv-U FTP Server < 15.0.0.0 Multiple Security Vulnerabilities | medium |
70446 | ProFTPD TELNET IAC Escape Sequence Remote Buffer Overflow | critical |
70210 | Alcatel OmniSwitch Default Credentials (ftp) | critical |
69060 | Serv-U < 14.0.2.0 FTP Server SSL Renegotiation DoS | medium |
66970 | ProFTPD FTP Command Handling Symlink Arbitrary File Overwrite | low |
65188 | War FTP Daemon 1.82 Denial of Service | critical |
65078 | Ruby ftpd Gem 'filename' Parameter Remote Command Execution | high |
63560 | Cerberus FTP Server < 5.0.6.0 Multiple XSS | medium |
63559 | Cerberus FTP Server < 5.0.5.0 Cross-Site Request Forgery | medium |