Описание
Maxum Rumpus FTP Server 1.3.3 and 2.0.3 dev 3 stores passwords in plaintext in the "Rumpus User Database" file in the prefs folder, which could allow attackers to gain privileges on the server.
Ссылки
- ExploitPatchVendor Advisory
- Vendor Advisory
- ExploitPatchVendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.0.3_dev_3 (включая)
Одно из
cpe:2.3:a:maxum_development_corporation:rumpus_ftp_server:*:*:*:*:*:*:*:*
cpe:2.3:a:maxum_development_corporation:rumpus_ftp_server:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:maxum_development_corporation:rumpus_ftp_server:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:maxum_development_corporation:rumpus_ftp_server:1.3.4:*:*:*:*:*:*:*
EPSS
Процентиль: 66%
0.00527
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
Maxum Rumpus FTP Server 1.3.3 and 2.0.3 dev 3 stores passwords in plaintext in the "Rumpus User Database" file in the prefs folder, which could allow attackers to gain privileges on the server.
EPSS
Процентиль: 66%
0.00527
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other