Page 19 of 205 results (0.007 seconds)

CVSS: 9.0EPSS: 2%CPEs: 1EXPL: 1

05 Feb 2008 — Buffer overflow in Ipswitch WS_FTP Server with SSH 6.1.0.0 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long opendir command. Desbordamiento de búfer en Ipswitch WS_FTP Server con SSH 6.1.0.0. Permite a usuarios remotamente autentificados provocar una denegación de servicio (caída) y posiblemente ejecutar código de su elección a través de un comando opendir largo. • https://www.exploit-db.com/exploits/5044 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 1%CPEs: 5EXPL: 0

15 Jul 2007 — Heap-based buffer overflow in _mprosrv.exe in Progress Software Progress 9.1E and OpenEdge 10.1x, as used by the RSA Authentication Manager 6.0 and 6.1, SecurID Appliance 2.0, ACE/Server 5.2, and possibly other products, allows remote attackers to execute arbitrary code via crafted packets. NOTE: this issue might overlap CVE-2007-3491. Desbordamiento de búfer basado en montículo en _mprosrv.exe de Progress Software Progress 9.1E y OpenEdge 10.1.x, como se usan en RSA Authentication Manager 6.0 y 6.1, SecurI... • http://dvlabs.tippingpoint.com/advisory/TPTI-07-12 •

CVSS: 9.8EPSS: 3%CPEs: 3EXPL: 0

29 Jun 2007 — Buffer overflow in _mprosrv in Progress Software OpenEdge before 9.1E0422, and 10.x before 10.1B01, allows remote attackers to have an unknown impact via a malformed TCP/IP message. Desbordamiento de búfer en _mprosrv de Progress Software OpenEdge anterior a 9.1E0422, y 10.x anterior a 10.1B01, permite a atacantes remotos tener impacto desconocido mediante mensajes TCP/IP mal formados. • http://osvdb.org/37747 •

CVSS: 7.8EPSS: 1%CPEs: 5EXPL: 2

04 May 2007 — WebSpeed 3.x in OpenEdge 10.x in Progress Software Progress 9.1e, and certain other 9.x versions, allows remote attackers to cause a denial of service (infinite loop and daemon hang) via a messenger URL that invokes _edit.r with no additional parameters, as demonstrated by requests for cgiip.exe or wsisa.dll with WService=wsbroker1/_edit.r in the PATH_INFO. WebSpeed 3.x de OpenEdge 10.x en Progress Software Progress 9.1e, y otras versiones concretas 9.x, permite a atacantes remotos provocar una denegación d... • https://www.exploit-db.com/exploits/29943 •

CVSS: 7.8EPSS: 4%CPEs: 1EXPL: 0

30 Apr 2007 — Progress Webspeed Messenger allows remote attackers to obtain sensitive information via a WService parameter containing "wsbroker1/webutil/about.r", which reveals the operating system and product information. Progress Webspeed Messenger permite a atacantes remotos obtener información confidencial mediante un parámetro WService conteniendo "wsbroker1/webutil/about.r", lo cual revela el sistema operativo e información de producto. • http://www.ishare.nl •

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 1

25 Apr 2007 — Progress Webspeed Messenger allows remote attackers to read, create, modify, and execute arbitrary files by invoking webutil/_cpyfile.p in the WService parameter to (1) cgiip.exe or (2) wsisa.dll in scripts/, as demonstrated by using the save,editor options to create a new file using the fileName parameter. Progress Webspeed Messenger permite a atacantes remotos leer, crear, modificar y ejecutar archivos de su elección invocando a webutil/_cpyfile.p en el parámetro WService en (1) cgiip.exe o (2) wsisa.dll ... • http://secunia.com/advisories/24988 •

CVSS: 7.5EPSS: 10%CPEs: 4EXPL: 0

26 Sep 2006 — Unspecified vulnerability in the log analyzer in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, prevents certain sensitive information from being displayed in the (1) Files and (2) Summary tabs. NOTE: in the early publication of this identifier on 20060926, the description was used for the wrong issue. Vulnerabilidad no especificada en el analizador de log en WS_FTP Server 5.05 anterior a Hotfix 1, y posiblemente versiones anteriores a la 5.0, previene que cierta información se... • http://www.ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp •

CVSS: 9.8EPSS: 32%CPEs: 4EXPL: 0

26 Sep 2006 — Multiple buffer overflows in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, have unknown impact and remote authenticated attack vectors via the (1) XCRC, (2) XMD5, and (3) XSHA1 commands. NOTE: in the early publication of this identifier on 20060926, the description was used for the wrong issue. Múltiples desbordamientos de búfer en WS_FTP Server 5.05 anterior a Hotfix 1, y posiblemente otras versiones anteriores a la 5.0, tienen impacto y vectores de ataque remotos autenticado... • http://securitytracker.com/id?1016935 •

CVSS: 8.8EPSS: 90%CPEs: 27EXPL: 2

19 Sep 2006 — Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands. Múltiples desbordamientos de búfer en Ipswitch WS_FTP Server 5.05 anterior al Hotfix 1 permiten a usuarios autenticados remotamente ejecutar código de su elección a través de comandos largos (1) XCRC, (2) XSHA1, o (3) XMD5. • https://www.exploit-db.com/exploits/16717 •

CVSS: 7.5EPSS: 3%CPEs: 20EXPL: 3

31 Dec 2004 — Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file. • http://marc.info/?l=bugtraq&m=108006717731989&w=2 • CWE-399: Resource Management Errors •