var-200812-0134
Vulnerability from variot
Ipswitch WS_FTP Server Manager before 6.1.1, and possibly other Ipswitch products, allows remote attackers to bypass authentication and read logs via a logLogout action to FTPLogServer/login.asp followed by a request to FTPLogServer/LogViewer.asp with the localhostnull account name. WS_FTP Server Manager is prone to an authentication-bypass vulnerability and an information-disclosure vulnerability. An attacker can exploit these issues to gain unauthorized access to the affected application and gain access to potentially sensitive information. These issues affect WS_FTP Server Manager 6.1.0.0; prior versions may also be affected. Ipswitch WS_FTP Server is a highly secure and easy-to-manage file transfer server.
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
Download and test it today: https://psi.secunia.com/
Read more about this new version: https://psi.secunia.com/?page=changelog
TITLE: IPSwitch WS_FTP Server Manager Security Bypass
SECUNIA ADVISORY ID: SA28822
VERIFY ADVISORY: http://secunia.com/advisories/28822/
CRITICAL: Moderately critical
IMPACT: Security Bypass, Exposure of sensitive information
WHERE:
From remote
SOFTWARE: WS_FTP Server 6.x http://secunia.com/product/14782/
DESCRIPTION: Luigi Auriemma has discovered a security issue in IPSwitch WS_FTP Server, which can be exploited by malicious people to bypass certain access restrictions and disclose sensitive information.
The security issue is caused due to an error within the WS_FTP Server Manager when processing HTTP requests for the FTPLogServer/LogViewer.asp script. This can be exploited to gain access to the log viewing interface by e.g. logging out and directly accessing the FTPLogServer/LogViewer.asp script.
SOLUTION: Restrict access to trusted users only.
PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma
ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/wsftpweblog-adv.txt
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200812-0134", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ws ftp", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "3.1.1" }, { "model": "ws ftp", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "3.1.2" }, { "model": "ws ftp", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "5.01" }, { "model": "ws ftp", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "6.0" }, { "model": "ws ftp", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "3.0.1" }, { "model": "ws ftp", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "2.01" }, { "model": "ws ftp", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "3.1.3" }, { "model": "ws ftp", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "3.0" }, { "model": "ws ftp", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "3.14" }, { "model": "ws ftp", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "2.03" }, { "model": "ws ftp", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "3.1.0" }, { "model": "ws ftp", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "4.00" }, { "model": "ws ftp", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "5.00" }, { "model": "ws ftp", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "5.02" }, { "model": "ws ftp", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "5.04" }, { "model": "ws ftp", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "1.0.5" }, { "model": "ws ftp", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "5.05" }, { "model": "ws ftp", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "5.03" }, { "model": "ws ftp", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "2.02" }, { "model": "ws ftp", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "4.01" }, { "model": "ws ftp", "scope": "lte", "trust": 1.0, "vendor": "ipswitch", "version": "6.1" }, { "model": "ws ftp", "scope": "eq", "trust": 1.0, "vendor": "ipswitch", "version": "4.02" }, { "model": "ws ftp", "scope": "lt", "trust": 0.8, "vendor": "ipswitch", "version": "server manager 6.1.1" }, { "model": "ws ftp server manager", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.1.0.0" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.1.0" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.0" }, { "model": "ws ftp server", "scope": "ne", "trust": 0.3, "vendor": "ipswitch", "version": "6.1.1" }, { "model": "ws ftp server", "scope": "ne", "trust": 0.3, "vendor": "ipswitch", "version": "7.1" } ], "sources": [ { "db": "BID", "id": "27654" }, { "db": "JVNDB", "id": "JVNDB-2008-005194" }, { "db": "CNNVD", "id": "CNNVD-200812-405" }, { "db": "NVD", "id": "CVE-2008-5692" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:ipswitch:ws_ftp", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005194" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma is credited with the discovery of these vulnerabilities.", "sources": [ { "db": "BID", "id": "27654" } ], "trust": 0.3 }, "cve": "CVE-2008-5692", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2008-5692", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-35817", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-5692", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2008-5692", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200812-405", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-35817", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-35817" }, { "db": "JVNDB", "id": "JVNDB-2008-005194" }, { "db": "CNNVD", "id": "CNNVD-200812-405" }, { "db": "NVD", "id": "CVE-2008-5692" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ipswitch WS_FTP Server Manager before 6.1.1, and possibly other Ipswitch products, allows remote attackers to bypass authentication and read logs via a logLogout action to FTPLogServer/login.asp followed by a request to FTPLogServer/LogViewer.asp with the localhostnull account name. WS_FTP Server Manager is prone to an authentication-bypass vulnerability and an information-disclosure vulnerability. \nAn attacker can exploit these issues to gain unauthorized access to the affected application and gain access to potentially sensitive information. \nThese issues affect WS_FTP Server Manager 6.1.0.0; prior versions may also be affected. Ipswitch WS_FTP Server is a highly secure and easy-to-manage file transfer server. \n\n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nDownload and test it today:\nhttps://psi.secunia.com/\n\nRead more about this new version:\nhttps://psi.secunia.com/?page=changelog\n\n----------------------------------------------------------------------\n\nTITLE:\nIPSwitch WS_FTP Server Manager Security Bypass\n\nSECUNIA ADVISORY ID:\nSA28822\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/28822/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSecurity Bypass, Exposure of sensitive information\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nWS_FTP Server 6.x\nhttp://secunia.com/product/14782/\n\nDESCRIPTION:\nLuigi Auriemma has discovered a security issue in IPSwitch WS_FTP\nServer, which can be exploited by malicious people to bypass certain\naccess restrictions and disclose sensitive information. \n\nThe security issue is caused due to an error within the WS_FTP Server\nManager when processing HTTP requests for the\nFTPLogServer/LogViewer.asp script. This can be exploited to gain\naccess to the log viewing interface by e.g. logging out and directly\naccessing the FTPLogServer/LogViewer.asp script. \n\nSOLUTION:\nRestrict access to trusted users only. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/wsftpweblog-adv.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-5692" }, { "db": "JVNDB", "id": "JVNDB-2008-005194" }, { "db": "BID", "id": "27654" }, { "db": "VULHUB", "id": "VHN-35817" }, { "db": "PACKETSTORM", "id": "63375" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-35817", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-35817" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-5692", "trust": 2.8 }, { "db": "BID", "id": "27654", "trust": 2.0 }, { "db": "SECUNIA", "id": "28822", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-0473", "trust": 1.7 }, { "db": "SREASON", "id": "4799", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2008-005194", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20080206 RE: LOGS VISUALIZATION IN WS_FTP SERVER MANAGER 6.1.0.0", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20080206 LOGS VISUALIZATION IN WS_FTP SERVER MANAGER 6.1.0.0", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200812-405", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-84469", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "31117", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-35817", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "63375", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-35817" }, { "db": "BID", "id": "27654" }, { "db": "JVNDB", "id": "JVNDB-2008-005194" }, { "db": "PACKETSTORM", "id": "63375" }, { "db": "CNNVD", "id": "CNNVD-200812-405" }, { "db": "NVD", "id": "CVE-2008-5692" } ] }, "id": "VAR-200812-0134", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-35817" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T23:00:08.682000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Fixed in 6.1.1", "trust": 0.8, "url": "http://docs.ipswitch.com/WS_FTP_Server611/ReleaseNotes/index.htm?k_id=ipswitch_ftp_documents_worldwide_ws_ftpserverv611releasenotes#link12" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005194" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-35817" }, { "db": "JVNDB", "id": "JVNDB-2008-005194" }, { "db": "NVD", "id": "CVE-2008-5692" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://aluigi.altervista.org/adv/wsftpweblog-adv.txt" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/27654" }, { "trust": 1.7, "url": "http://docs.ipswitch.com/ws_ftp_server611/releasenotes/index.htm?k_id=ipswitch_ftp_documents_worldwide_ws_ftpserverv611releasenotes#link12" }, { "trust": 1.7, "url": "http://secunia.com/advisories/28822" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/4799" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/487686/100/200/threaded" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/487697/100/200/threaded" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/0473" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5692" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-5692" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/487697/100/200/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/487686/100/200/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0473" }, { "trust": 0.3, "url": "http://www.ipswitch.com/products/ws_ftp/home/index.asp" }, { "trust": 0.3, "url": "/archive/1/487682" }, { "trust": 0.3, "url": "http://www.ipswitchft.com/support/ws_ftp_server/releases/wr611.asp" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/14782/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28822/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-35817" }, { "db": "BID", "id": "27654" }, { "db": "JVNDB", "id": "JVNDB-2008-005194" }, { "db": "PACKETSTORM", "id": "63375" }, { "db": "CNNVD", "id": "CNNVD-200812-405" }, { "db": "NVD", "id": "CVE-2008-5692" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-35817" }, { "db": "BID", "id": "27654" }, { "db": "JVNDB", "id": "JVNDB-2008-005194" }, { "db": "PACKETSTORM", "id": "63375" }, { "db": "CNNVD", "id": "CNNVD-200812-405" }, { "db": "NVD", "id": "CVE-2008-5692" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-12-19T00:00:00", "db": "VULHUB", "id": "VHN-35817" }, { "date": "2008-02-06T00:00:00", "db": "BID", "id": "27654" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005194" }, { "date": "2008-02-08T01:19:15", "db": "PACKETSTORM", "id": "63375" }, { "date": "2008-12-19T00:00:00", "db": "CNNVD", "id": "CNNVD-200812-405" }, { "date": "2008-12-19T18:30:00.407000", "db": "NVD", "id": "CVE-2008-5692" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-11T00:00:00", "db": "VULHUB", "id": "VHN-35817" }, { "date": "2016-07-06T14:17:00", "db": "BID", "id": "27654" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005194" }, { "date": "2009-01-29T00:00:00", "db": "CNNVD", "id": "CNNVD-200812-405" }, { "date": "2024-11-21T00:54:39.713000", "db": "NVD", "id": "CVE-2008-5692" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200812-405" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ipswitch WS_FTP Server Manager Vulnerable to read logs", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005194" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-200812-405" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.