A vulnerability has been discovered in CrushFTP, which could allow for unauthorized access. CrushFTP is a proprietary multi-protocol, multi-platform file transfer server. The vulnerability is mitigated if the DMZ feature of CrushFTP is in place. Successful exploitation of this vulnerability could allow an attacker to remotely control the compromised server and execute remote code. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
More Stories
USN-7397-1: AOM vulnerability
Xiantong Hou discovered that AOM did not properly handle certain malformed media files. If an application using AOM opened a...
USN-7396-1: OVN vulnerability
Marius Berntsberg, Trygve Vea, Tore Anderson, Rodolfo Alonso, Jay Faulkner, and Brian Haley discovered that OVN incorrectly handled certain crafted...
USN-7395-1: WebKitGTK vulnerabilities
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a...
USN-7376-2: MariaDB vulnerability
USN-7376-1 fixed vulnerabilities in MariaDB. This update provides the corresponding updates for Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. Original...
USN-7394-1: Doorkeeper vulnerabilities
Jonathan Clem and Justin Bull discovered that Doorkeeper could allow arbitrary token revocation and replay attacks. An attacker could possibly...
perl-Data-Entropy-0.008-1.fc42
FEDORA-2025-76dbde76fe Packages in this update: perl-Data-Entropy-0.008-1.fc42 Update description: Prior to version 0.008, the Perl module Data::Entropy relied on Perl's builtin...