
Client-side resumability No built-in file size limits of ASP.NET FileUp Customers Popular KB Articles.

This is a record on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities. SoftArtisans easy-to-use file transfer products benefit both large corporations and individual developers looking to create powerful HTTP file upload and download web applications. Necessarily indicate when this vulnerability wasĭiscovered, shared with the affected vendor, publicly
SOFTARTISANS XFILE CODE
The CVE ID was allocated or reserved, and does not dll in SoftArtisans XFile before 2.4.0 allow remote attackers to execute arbitrary code via unspecified calls to the (1) BuildPath, (2) GetDriveName, (3). The list is not intended to be complete.ĭisclaimer: The record creation date may reflect when When sending an overly long string to the GetDriveName () method an attacker may be able to execute arbitrary code. Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. This module exploits a stack buffer overflow in SoftArtisans XFile FileManager ActiveX control (SAFmgPwd.dll 2.0.5.3). SoftArtisans FileManager is 100 script compatible with Microsoft's Scripting.FileSystemObject, while offering numerous advantages: Security Features.


SoftArtisans FileManager answers all of your file management needs in a single, easy-to-use control. Multiple stack-based buffer overflows in the FileManager ActiveX control in SAFmgPws.dll in SoftArtisans XFile before 2.4.0 allow remote attackers to execute arbitrary code via unspecified calls to the (1) BuildPath, (2) GetDriveName, (3) DriveExists, or (4) DeleteFile method. SoftArtisans FileUpFileUp processes uploads sent from a client over HTTP to a server running Microsoft Internet Information Server (IIS).Uploads are typically submitted from a web page or from a client-side ActiveX control such as SoftArtisans XFile. You received SoftArtisans FileManager free with your purchase of XFile.
