
CVE-2008-0590 – Ipswitch WS_FTP Server with SSH 6.1.0.0 - Remote Buffer Overflow (PoC)
https://notcve.org/view.php?id=CVE-2008-0590
05 Feb 2008 — Buffer overflow in Ipswitch WS_FTP Server with SSH 6.1.0.0 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long opendir command. Desbordamiento de búfer en Ipswitch WS_FTP Server con SSH 6.1.0.0. Permite a usuarios remotamente autentificados provocar una denegación de servicio (caída) y posiblemente ejecutar código de su elección a través de un comando opendir largo. • https://www.exploit-db.com/exploits/5044 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2007-2417
https://notcve.org/view.php?id=CVE-2007-2417
15 Jul 2007 — Heap-based buffer overflow in _mprosrv.exe in Progress Software Progress 9.1E and OpenEdge 10.1x, as used by the RSA Authentication Manager 6.0 and 6.1, SecurID Appliance 2.0, ACE/Server 5.2, and possibly other products, allows remote attackers to execute arbitrary code via crafted packets. NOTE: this issue might overlap CVE-2007-3491. Desbordamiento de búfer basado en montículo en _mprosrv.exe de Progress Software Progress 9.1E y OpenEdge 10.1.x, como se usan en RSA Authentication Manager 6.0 y 6.1, SecurI... • http://dvlabs.tippingpoint.com/advisory/TPTI-07-12 •

CVE-2007-3491
https://notcve.org/view.php?id=CVE-2007-3491
29 Jun 2007 — Buffer overflow in _mprosrv in Progress Software OpenEdge before 9.1E0422, and 10.x before 10.1B01, allows remote attackers to have an unknown impact via a malformed TCP/IP message. Desbordamiento de búfer en _mprosrv de Progress Software OpenEdge anterior a 9.1E0422, y 10.x anterior a 10.1B01, permite a atacantes remotos tener impacto desconocido mediante mensajes TCP/IP mal formados. • http://osvdb.org/37747 •

CVE-2007-2506 – Progress WebSpeed 3.0/3.1 - Denial of Service
https://notcve.org/view.php?id=CVE-2007-2506
04 May 2007 — WebSpeed 3.x in OpenEdge 10.x in Progress Software Progress 9.1e, and certain other 9.x versions, allows remote attackers to cause a denial of service (infinite loop and daemon hang) via a messenger URL that invokes _edit.r with no additional parameters, as demonstrated by requests for cgiip.exe or wsisa.dll with WService=wsbroker1/_edit.r in the PATH_INFO. WebSpeed 3.x de OpenEdge 10.x en Progress Software Progress 9.1e, y otras versiones concretas 9.x, permite a atacantes remotos provocar una denegación d... • https://www.exploit-db.com/exploits/29943 •

CVE-2007-2354
https://notcve.org/view.php?id=CVE-2007-2354
30 Apr 2007 — Progress Webspeed Messenger allows remote attackers to obtain sensitive information via a WService parameter containing "wsbroker1/webutil/about.r", which reveals the operating system and product information. Progress Webspeed Messenger permite a atacantes remotos obtener información confidencial mediante un parámetro WService conteniendo "wsbroker1/webutil/about.r", lo cual revela el sistema operativo e información de producto. • http://www.ishare.nl •

CVE-2007-2266
https://notcve.org/view.php?id=CVE-2007-2266
25 Apr 2007 — Progress Webspeed Messenger allows remote attackers to read, create, modify, and execute arbitrary files by invoking webutil/_cpyfile.p in the WService parameter to (1) cgiip.exe or (2) wsisa.dll in scripts/, as demonstrated by using the save,editor options to create a new file using the fileName parameter. Progress Webspeed Messenger permite a atacantes remotos leer, crear, modificar y ejecutar archivos de su elección invocando a webutil/_cpyfile.p en el parámetro WService en (1) cgiip.exe o (2) wsisa.dll ... • http://secunia.com/advisories/24988 •

CVE-2006-5001
https://notcve.org/view.php?id=CVE-2006-5001
26 Sep 2006 — Unspecified vulnerability in the log analyzer in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, prevents certain sensitive information from being displayed in the (1) Files and (2) Summary tabs. NOTE: in the early publication of this identifier on 20060926, the description was used for the wrong issue. Vulnerabilidad no especificada en el analizador de log en WS_FTP Server 5.05 anterior a Hotfix 1, y posiblemente versiones anteriores a la 5.0, previene que cierta información se... • http://www.ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp •

CVE-2006-5000 – Ipswitch WS_FTP Server Checksum Command Parsing Buffer Overflow Vulnerabilities
https://notcve.org/view.php?id=CVE-2006-5000
26 Sep 2006 — Multiple buffer overflows in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, have unknown impact and remote authenticated attack vectors via the (1) XCRC, (2) XMD5, and (3) XSHA1 commands. NOTE: in the early publication of this identifier on 20060926, the description was used for the wrong issue. Múltiples desbordamientos de búfer en WS_FTP Server 5.05 anterior a Hotfix 1, y posiblemente otras versiones anteriores a la 5.0, tienen impacto y vectores de ataque remotos autenticado... • http://securitytracker.com/id?1016935 •

CVE-2006-4847 – Ipswitch WS_FTP Server 5.05 - XMD5 Overflow
https://notcve.org/view.php?id=CVE-2006-4847
19 Sep 2006 — Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands. Múltiples desbordamientos de búfer en Ipswitch WS_FTP Server 5.05 anterior al Hotfix 1 permiten a usuarios autenticados remotamente ejecutar código de su elección a través de comandos largos (1) XCRC, (2) XSHA1, o (3) XMD5. • https://www.exploit-db.com/exploits/16717 •

CVE-2004-1848
https://notcve.org/view.php?id=CVE-2004-1848
31 Dec 2004 — Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file. • http://marc.info/?l=bugtraq&m=108006717731989&w=2 • CWE-399: Resource Management Errors •