The PSFTPd 10.0.4 Build 729 server does not properly escape data before writing it into a Comma Separated Values (CSV) file. This can be used by attackers to hide data in the Graphical User Interface (GUI) view and create arbitrary entries to a certain extent
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
Prion | Hardcoded credentials | 15 Nov 201716:29 | – | prion |
NVD | CVE-2017-15270 | 15 Nov 201716:29 | – | nvd |
CVE | CVE-2017-15270 | 15 Nov 201716:29 | – | cve |
exploitpack | PSFTPd Windows FTP Server 10.0.4 Build 729 - Log Injection Use-After-Free | 14 Nov 201700:00 | – | exploitpack |
Packet Storm | PSFTPd Windows FTP Server 10.0.4 Build 729 Use-After-Free / Log Injection | 10 Nov 201700:00 | – | packetstorm |
0day.today | PSFTPd Windows FTP Server 10.0.4 Build 729 - Log Injection / Use-After-Free Vulnerability | 15 Nov 201700:00 | – | zdt |
Exploit DB | PSFTPd Windows FTP Server 10.0.4 Build 729 - Log Injection / Use-After-Free | 14 Nov 201700:00 | – | exploitdb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo