Page 2 of 20 results (0.006 seconds)

CVSS: 10.0EPSS: 11%CPEs: 19EXPL: 2

26 Mar 2001 — Format string vulnerability in wu-ftp 2.6.1 and earlier, when running with debug mode enabled, allows remote attackers to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment. • https://www.exploit-db.com/exploits/20594 •

CVSS: 9.8EPSS: 10%CPEs: 20EXPL: 1

07 Jul 2000 — FTP servers such as OpenBSD ftpd, NetBSD ftpd, ProFTPd and Opieftpd do not properly cleanse untrusted format strings that are used in the setproctitle function (sometimes called by set_proc_title), which allows remote attackers to cause a denial of service or execute arbitrary commands. • https://www.exploit-db.com/exploits/396 •

CVSS: 9.8EPSS: 12%CPEs: 7EXPL: 1

20 Dec 1999 — wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress. • https://www.exploit-db.com/exploits/20563 •

CVSS: 10.0EPSS: 0%CPEs: 17EXPL: 0

22 Aug 1999 — Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via MAPPING_CHDIR. • http://www.securityfocus.com/bid/599 •

CVSS: 10.0EPSS: 8%CPEs: 17EXPL: 2

09 Feb 1999 — Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto. • https://www.exploit-db.com/exploits/19086 •

CVSS: 9.1EPSS: 1%CPEs: 32EXPL: 0

10 Dec 1997 — FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017 •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

23 Sep 1997 — Race condition in wu-ftpd and BSDI ftpd allows remote attackers to gain root access via the SITE EXEC command. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0955 •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

04 Jul 1997 — wu-ftpd 2.4 FTP server does not properly drop privileges when an ABOR (abort file transfer) command is executed during a file transfer, which causes a signal to be handled incorrectly and allows local and possibly remote attackers to read arbitrary files. • http://marc.info/?l=bugtraq&m=87602167420401&w=2 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

01 Jan 1997 — The GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands. • https://www.cve.org/CVERecord?id=CVE-1999-0202 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

30 Nov 1995 — Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the "site exec" command. • https://archive.nanog.org/mailinglist/mailarchives/old_archive/1995-11/msg00385.html •