CVE-2004-1135 – Ipswitch WS_FTP Server 5.03 - MKD Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-1135
Multiple buffer overflows in WS_FTP Server 5.03 2004.10.14 allow remote attackers to cause a denial of service (service crash) via long (1) SITE, (2) XMKD, (3) MKD, and (4) RNFR commands. • https://www.exploit-db.com/exploits/664 https://www.exploit-db.com/exploits/16719 http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029600.html http://marc.info/?l=bugtraq&m=110177654524819&w=2 http://www.securiteam.com/exploits/6D00L2KBPG.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18296 •
CVE-2004-0799
https://notcve.org/view.php?id=CVE-2004-0799
The HTTP daemon in Ipswitch WhatsUp Gold 8.03 and 8.03 Hotfix 1 allows remote attackers to cause a denial of service (server crash) via a GET request containing an MS-DOS device name, as demonstrated using "prn.htm". El demonio HTTP de Ipswitch WhatsUp Gold 8,03 y 8.03 Hotfix 1 permite a atacantes remotos causar una denegación de servicio (caída del servidor) mediante una petición GET conteniendo un nombre de dispositivo MS-DOS, como se ha demostrado usando "prn.htm". • http://www.idefense.com/application/poi/display?id=142&type=vulnerabilities http://www.ipswitch.com/Support/WhatsUp/patch-upgrades.html https://exchange.xforce.ibmcloud.com/vulnerabilities/17418 •
CVE-2004-0297 – IPSwitch IMail LDAP Daemon/Service - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-0297
Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) in Ipswitch IMail Server 8.03 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via an LDAP message with a large tag length. Desbordamiento de búfer en el demonio Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) de Ipswitch IMail Server 8.03 permite a atacantes remotos causar una denegación de servicio (caída) y ejecutar código de su elección mediante un mensaje LDAP con una etiqueta de longitud larga. • https://www.exploit-db.com/exploits/157 https://www.exploit-db.com/exploits/16824 http://www.idefense.com/application/poi/display?id=74 http://www.ipswitch.com/support/imail/releases/imail_professional/im805HF2.html http://www.kb.cert.org/vuls/id/972334 http://www.osvdb.org/3984 http://www.securityfocus.com/bid/9682 https://exchange.xforce.ibmcloud.com/vulnerabilities/15243 •
CVE-2004-0798 – IPSwitch WhatsUp Gold 8.03 - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-0798
Buffer overflow in the _maincfgret.cgi script for Ipswitch WhatsUp Gold before 8.03 Hotfix 1 allows remote attackers to execute arbitrary code via a long instancename parameter. Desbordamiento de búfer en el script _maincfgret.cgi de Ipswithc WhatsUp Gold anteriores a 8.03 Hotfix 1 permite a atacantes remotos ejecutar código de su elección mediante un parámetro instancename largo. • https://www.exploit-db.com/exploits/566 https://www.exploit-db.com/exploits/16787 http://www.idefense.com/application/poi/display?type=vulnerabilities http://www.ipswitch.com/Support/WhatsUp/patch-upgrades.html http://www.securityfocus.com/bid/11043 https://exchange.xforce.ibmcloud.com/vulnerabilities/17111 - •
CVE-2004-1884
https://notcve.org/view.php?id=CVE-2004-1884
Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access. • http://marc.info/?l=bugtraq&m=108006581418116&w=2 http://secunia.com/advisories/11206 http://www.securityfocus.com/bid/9953 https://exchange.xforce.ibmcloud.com/vulnerabilities/15558 •