Page 10 of 125 results (0.001 seconds)

CVSS: 7.5EPSS: 29%CPEs: 1EXPL: 2

08 Dec 2004 — Multiple buffer overflows in WS_FTP Server 5.03 2004.10.14 allow remote attackers to cause a denial of service (service crash) via long (1) SITE, (2) XMKD, (3) MKD, and (4) RNFR commands. • https://www.exploit-db.com/exploits/664 •

CVSS: 7.5EPSS: 5%CPEs: 7EXPL: 0

17 Sep 2004 — The HTTP daemon in Ipswitch WhatsUp Gold 8.03 and 8.03 Hotfix 1 allows remote attackers to cause a denial of service (server crash) via a GET request containing an MS-DOS device name, as demonstrated using "prn.htm". El demonio HTTP de Ipswitch WhatsUp Gold 8,03 y 8.03 Hotfix 1 permite a atacantes remotos causar una denegación de servicio (caída del servidor) mediante una petición GET conteniendo un nombre de dispositivo MS-DOS, como se ha demostrado usando "prn.htm". • http://www.idefense.com/application/poi/display?id=142&type=vulnerabilities •

CVSS: 10.0EPSS: 57%CPEs: 2EXPL: 3

01 Sep 2004 — Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) in Ipswitch IMail Server 8.03 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via an LDAP message with a large tag length. Desbordamiento de búfer en el demonio Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) de Ipswitch IMail Server 8.03 permite a atacantes remotos causar una denegación de servicio (caída) y ejecutar código de su elección mediant... • https://www.exploit-db.com/exploits/157 •

CVSS: 9.8EPSS: 64%CPEs: 6EXPL: 2

27 Aug 2004 — Buffer overflow in the _maincfgret.cgi script for Ipswitch WhatsUp Gold before 8.03 Hotfix 1 allows remote attackers to execute arbitrary code via a long instancename parameter. Desbordamiento de búfer en el script _maincfgret.cgi de Ipswithc WhatsUp Gold anteriores a 8.03 Hotfix 1 permite a atacantes remotos ejecutar código de su elección mediante un parámetro instancename largo. • https://www.exploit-db.com/exploits/566 •

CVSS: 9.8EPSS: 0%CPEs: 24EXPL: 2

23 Mar 2004 — Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access. • http://marc.info/?l=bugtraq&m=108006581418116&w=2 •

CVSS: 8.8EPSS: 81%CPEs: 2EXPL: 2

12 Sep 2003 — Multiple buffer overflows in WS_FTP 3 and 4 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via long (1) APPE (append) or (2) STAT (status) arguments. Múltiples desboradamientos de búfer en WS_FTP 3 y 4 permite a usuarios remotos autenticados causar una denegación de servicio y posiblemente ejecutar código arbitrario mediaten argumentos APPEND o STAT (estado) largos. • https://www.exploit-db.com/exploits/23100 •

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 0

31 Dec 2002 — Buffer overflow in WS_FTP Pro 7.5 allows remote attackers to execute code on a client system via unknown attack vectors. • http://www.iss.net/security_center/static/10185.php •

CVSS: 9.8EPSS: 6%CPEs: 12EXPL: 2

04 Oct 2002 — Buffer overflow in the Web Messaging daemon for Ipswitch IMail before 7.12 allows remote attackers to execute arbitrary code via a long HTTP GET request for HTTP/1.0. • https://www.exploit-db.com/exploits/21654 •

CVSS: 7.5EPSS: 11%CPEs: 12EXPL: 2

31 Aug 2002 — IPSwitch IMail Web Calendaring service (iwebcal) allows remote attackers to cause a denial of service (crash) via an HTTP POST request without a Content-Length field. • https://www.exploit-db.com/exploits/21673 •

CVSS: 10.0EPSS: 42%CPEs: 24EXPL: 0

12 Aug 2002 — Buffer overflow in the LDAP component of Ipswitch IMail 7.1 and earlier allows remote attackers to execute arbitrary code via a long "bind DN" parameter. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0172.html •