Surge FTP's administrative web interface suffers from an Apache Tomcat 5.5.26 directory traversal vulnerability.
5aa049891604b9dfa07b7722c2d65d120db87b6fa8bce970aa60b60c0e9d479d
NetWin SurgeFTP version 23f2 suffers from multiple persistent cross site scripting vulnerabilities.
cb86e442ff84f5e815cc2692af37acce6e30fbd8973d937b161b7cbe34ca12bb
Netwin SurgeFTP server version 23d6 suffers from multiple stored cross site scripting vulnerabilities.
8a738fcf73b0741fa19ac83402727e9db5fc3288bf5f2c65355a00eec7780e86
Surge FTP server versions 23c8 and below suffer from a buffer overflow vulnerability.
8371e4e6a2219b80f0cdd60273de6526a797aaa7f16bbda2d393ad1b7b415834
This Metasploit module exploits a vulnerability found in Netwin SurgeFTP, version 23c8 or prior. In order to execute commands via the FTP service, please note that you must have a valid credential to the web-based administrative console.
d2cfc6fc7d86461f770fda0e4daee3857ea9a4952d95f4921e2a9e92c4b23c57
This Metasploit module exploits a flaw in the SurgeFTP server's web-based administrative console to execute arbitrary commands.
9c5497a6325d67d7f481c7eb716e3d3140096da4260b045df2ab7396b276dad6
Surge-FTP version 23b6 suffers from multiple cross site scripting vulnerabilities.
c4cac949fe0724969f92b678d5000ab08b6fa1d2d6bd11b348a7070098990d47
Secunia Security Advisory - A vulnerability has been discovered in SurgeFTP, which can be exploited by malicious people to conduct cross-site scripting attacks.
f7b99e85c4a3eef5231959d1c9d7c4920b08552fe14b34dc92aaae3947e0107b
Surge-FTP suffers from an administrative web interface cross site scripting vulnerability.
3647c9dbf6a9fe304ceceda29eece4259647eb66d41dcee1ea92100a3f07a88d
Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in SurgeFTP, which can be exploited by malicious people to cause a DoS (Denial of Service).
2ac14e5075d62262656eee196fa8af16aa10991cd9f3d5cb34a3fa14b0cc36cd
SurgeFTP versions 2.3a2 and below suffer from a NULL pointer access vulnerability that allows for a denial of service condition. Proof of concept exploit included.
96ba9e5381e592d4d072a44bfec95c6c709a514dfe354bb195848ce5f7acd8cf
Secunia Security Advisory - Nico Leidecker has reported some vulnerabilities in SurgeFTP, which can be exploited by malicious people to conduct script insertion attacks and cause a DoS (Denial of Service).
398ab6d1a256a660e8bcb639b3bd3a29f668215f8fe3913d81f69bf172f3da15
SurgeFTP version 2.3a1 Linux suffers from a cross site scripting vulnerability.
eef9a98052e8bafe92d55157a4fa35e226ac63cbe789ec403cfc1bb8b0d1221e
SurgeFTP version 2.3a1 Linux suffers from a denial of service condition in its mirror mechanism.
c2e32fdacdb65dce7021a2557bc1a2223d451dd4eeac4d1916119a75c0f49443
SurgeFTP is susceptible to a LEAK command denial of service vulnerability. Tested versions include SurgeFTP versions 2.2m1 and 2.2k3 Windows on English Win2K SP4, WinXP SP2.
870f7f9a0e500e8dfffd3386dd856ff95f0c6018ebb9e1b154f414caa090d494
Secunia Security Advisory - Tan Chew Keong has reported a vulnerability in SurgeFTP, which can be exploited by malicious people to cause a DoS (Denial of Service).
fd25e53336514a24e56a87b14c63205d6d004ab8b526d5d499319544a09badf6