A security advisory was created for SFTPPlus version 3.18.0 affecting Linux and Unix systems that rely on the umask functionality.
Keep up to date on SFTPPlus
We are pleased to announce the latest release of SFTPPlus, version 3.18.0.
It includes support for listening on port below 1024 using Unix special capabilities and...
We are pleased to announce the latest release of SFTPPlus, version 3.17.0.
It includes a fix for the FTPS connection not being successfully closed in the case in which the FTP client...
SFTPPlus version 3.13.1 was release as a bugfix release on top of 3.13.0.
It includes a security fix in which the transfer scripts were previously executed a root, even if the process...
SFTPPlus Team announces a new release of SFTPPlus Client, version 1.5.64.
In this version we fixed FTPS transfers for Linux/Unix operating systems.
A new transfer setting was...
SFTPPlus version 3.11.1 was release as a bugfix release on top of 3.11.0.
It includes a security fix in which the transfer scripts were previously executed a root, even if the process...
We are pleased to announce the latest release of SFTPPlus, version 3.16.0.
It includes a security fix in which the transfer scripts were previously executed a root, even if the process...
We are pleased to announce the latest release of SFTPPlus, version 3.15.0.
The release was done to address an intercompatiblity issue of SFTPPlus FTPS server-side when interacting with...
We are pleased to announce the latest release of SFTPPlus, version 3.14.0.
It adds support for the Next CRL Publish extension used to schedule the automatic refresh of a...
We are pleased to announce the latest release of SFTPPlus, version 3.13.0.
This release adds support for authenticating account stored in LDAP
Beside many other small...
We are pleased to announce the latest release of SFTPPlus, version 3.12.0.
This release adds a couple of security related functionalities and security related defect fixes.
Here...
SFTPPlus Team announces a new release of SFTPPlus Client, version 1.5.63.
In this version we have fixed FTPS get/put transfers for Windows when the product is installed in a folder path...
We are pleased to announce the latest release of SFTPPlus, version 3.11.0.
This release adds SUSE Linux Enterprise Server (SLES) 10 to the list of supported SUSE versions.
The...
We are pleased to announce the latest release of SFTPPlus, version 3.10.1. This is a bug fix only release, no new features were added.
We continue to focus on improving the quality of...
We are pleased to announce the latest release of SFTPPlus, version 3.10.0.
In this release we have improved the FTP implementation to allow configuring the default data type used by...
We are announcing that SFTPPlus Server version 1.8 has reached end of life.
As described in our Product Life Cycle...
We are pleased to announce the latest release of SFTPPlus, version 3.9.0.
In this release we improved the fault-tolerant capabilities for the client-side transfers.
Another...
We are pleased to announce the latest release of SFTPPlus, version 3.8.0.
In this release we expanded the list of supported Linux distribution to include Ubuntu 16.04 LTS on X86_64. We...
We are pleased to announce the latest release of SFTPPlus, version 3.7.0.
Here is the list of the important new functionalities:
- The OpenSSL version...
SFTPPlus Team announces a new release of SFTPPlus Client, version 1.5.61.
In this version we have fixed a regression in which SFTP transfer using absolute inbox path were...
We are pleased to announce the latest release of SFTPPlus, version 3.6.0.
Here is the list of the important new functionalities:
- The OpenSSL version used by...
SFTPPlus Server versions 1.6 and newer are not vulnerable to the DROWN attack.
We have released version 3.5.1 of SFTPPlus, which is a release containing only defect fixes.
Here is the list of fixes:
- Event with ID 20024 is now emitted for...
We are pleased to announce the latest release of SFTPPlus, version 3.5.0.
In this version we added the functionality of dispatching files received by both service side services and...