Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Progress Software Corporation | WS_FTP Server | 8.8.0 ~ 8.8.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Analysis of WS_FTP CVE | https://github.com/kenbuckler/WS_FTP-CVE-2023-40044 | POC Details |
| 2 | In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-40044.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-42657 | 9.9 CRITICAL | WS_FTP Server Directory Traversal |
| CVE-2023-40047 | 8.3 HIGH | WS_FTP Server Stored Cross-Site Scripting Vulnerability |
| CVE-2023-40045 | 8.3 HIGH | WS_FTP Server Ad Hoc Transfer Module Reflected Cross-Site Scripting Vulnerability |
| CVE-2023-40046 | 8.2 HIGH | WS_FTP Server SQL Injection via Administrative Interface |
| CVE-2023-40048 | 6.8 MEDIUM | WS_FTP Server Cross-Site Request Forgery (CSRF) Vulnerability |
| CVE-2023-40049 | 5.3 MEDIUM | WS_FTP Server Information Disclosure via Directory Listing |
No comments yet