📦 Filestash
by Filestash
🔍 What is Filestash?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in filestash v0.4 disables TLS certificate verification for FTPS connections, allowing man-in-the-middle attackers to intercept and potentially modify data transfers. It affects all...
This vulnerability in filestash v0.4 disables SSH host key verification, allowing man-in-the-middle attackers to intercept and potentially steal sensitive data transmitted via SSH connections. Anyone ...