Page 3 of 15 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 24EXPL: 2

Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access. • http://marc.info/?l=bugtraq&m=108006581418116&w=2 http://secunia.com/advisories/11206 http://www.securityfocus.com/bid/9953 https://exchange.xforce.ibmcloud.com/vulnerabilities/15558 •

CVSS: 7.5EPSS: 95%CPEs: 2EXPL: 2

Multiple buffer overflows in WS_FTP 3 and 4 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via long (1) APPE (append) or (2) STAT (status) arguments. Múltiples desboradamientos de búfer en WS_FTP 3 y 4 permite a usuarios remotos autenticados causar una denegación de servicio y posiblemente ejecutar código arbitrario mediaten argumentos APPEND o STAT (estado) largos. • https://www.exploit-db.com/exploits/23100 http://marc.info/?l=bugtraq&m=106288825902868&w=2 http://secunia.com/advisories/9671 http://www.kb.cert.org/vuls/id/219140 http://www.kb.cert.org/vuls/id/792284 http://www.securityfocus.com/bid/8542 https://exchange.xforce.ibmcloud.com/vulnerabilities/13119 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 1

IPswitch WS_FTP allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920. • https://www.exploit-db.com/exploits/19167 http://marc.info/?l=ntbugtraq&m=91816507920544&w=2 http://www.securityfocus.com/bid/218 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

WS_FTP server remote denial of service through cwd command. • http://www.eeye.com/html/Research/Advisories/AD02021999.html http://www.securityfocus.com/bid/217 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 2

IPswitch IMail allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920. • https://www.exploit-db.com/exploits/19167 http://marc.info/?l=ntbugtraq&m=91816507920544&w=2 http://www.securityfocus.com/bid/218 •