{"api_version":"1","generated_at":"2026-04-24T16:35:56+00:00","cve":"CVE-2010-2695","urls":{"html":"https://cve.report/CVE-2010-2695","api":"https://cve.report/api/cve/CVE-2010-2695.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2010-2695","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2010-2695"},"summary":{"title":"CVE-2010-2695","description":"Directory traversal vulnerability in the SFTP/SSH2 virtual server in Xlight FTP Server 3.5.0, 3.5.5, and possibly other versions before 3.6 allows remote authenticated users to read, overwrite, or delete arbitrary files via .. (dot dot) sequences in the (1) ls, (2) rm, (3) rename, and other unspecified commands.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2010-07-12 17:30:00","updated_at":"2018-10-10 19:59:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"http://www.securityfocus.com/archive/1/512192/100/0/threaded","name":"20100705 Xlight FTPd Multiple Directory Traversal in SFTP","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60151","name":"xlight-sftp-directory-traversal(60151)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://osvdb.org/66037","name":"66037","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.xlightftpd.com/whatsnew.htm","name":"http://www.xlightftpd.com/whatsnew.htm","refsource":"CONFIRM","tags":["Patch"],"title":"Xlight FTP Server - what is new","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/40473","name":"40473","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Xlight FTP Server \"SFTP\" Directory Traversal Vulnerability - Advisories - Community","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2010-2695","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2695","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2010","cve_id":"2695","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xlightftpd","cpe5":"xlight_ftp_server","cpe6":"3.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2695","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xlightftpd","cpe5":"xlight_ftp_server","cpe6":"3.5.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2695","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xlightftpd","cpe5":"xlight_ftp_server","cpe6":"3.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2695","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xlightftpd","cpe5":"xlight_ftp_server","cpe6":"3.5.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2010-2695","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Directory traversal vulnerability in the SFTP/SSH2 virtual server in Xlight FTP Server 3.5.0, 3.5.5, and possibly other versions before 3.6 allows remote authenticated users to read, overwrite, or delete arbitrary files via .. (dot dot) sequences in the (1) ls, (2) rm, (3) rename, and other unspecified commands."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20100705 Xlight FTPd Multiple Directory Traversal in SFTP","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/512192/100/0/threaded"},{"name":"http://www.xlightftpd.com/whatsnew.htm","refsource":"CONFIRM","url":"http://www.xlightftpd.com/whatsnew.htm"},{"name":"xlight-sftp-directory-traversal(60151)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60151"},{"name":"66037","refsource":"OSVDB","url":"http://osvdb.org/66037"},{"name":"40473","refsource":"SECUNIA","url":"http://secunia.com/advisories/40473"}]}},"nvd":{"publishedDate":"2010-07-12 17:30:00","lastModifiedDate":"2018-10-10 19:59:00","problem_types":["CWE-22"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:xlightftpd:xlight_ftp_server:3.5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:xlightftpd:xlight_ftp_server:3.5.5:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2010","CveId":"2695","Ordinal":"44904","Title":"CVE-2010-2695","CVE":"CVE-2010-2695","Year":"2010"},"notes":[{"CveYear":"2010","CveId":"2695","Ordinal":"1","NoteData":"Directory traversal vulnerability in the SFTP/SSH2 virtual server in Xlight FTP Server 3.5.0, 3.5.5, and possibly other versions before 3.6 allows remote authenticated users to read, overwrite, or delete arbitrary files via .. (dot dot) sequences in the (1) ls, (2) rm, (3) rename, and other unspecified commands.","Type":"Description","Title":null},{"CveYear":"2010","CveId":"2695","Ordinal":"2","NoteData":"2010-07-12","Type":"Other","Title":"Published"},{"CveYear":"2010","CveId":"2695","Ordinal":"3","NoteData":"2018-10-10","Type":"Other","Title":"Modified"}]}}}