Page 3 of 32 results (0.002 seconds)

CVSS: 7.5EPSS: 3%CPEs: 20EXPL: 3

31 Dec 2004 — Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file. • http://marc.info/?l=bugtraq&m=108006717731989&w=2 • CWE-399: Resource Management Errors •

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 1

31 Dec 2004 — Multiple buffer overflows in Ipswitch WS_FTP Server 4.0.2 (1) allow remote authenticated users to execute arbitrary code by causing a large error string to be generated by the ALLO handler, or (2) may allow remote FTP administrators to execute arbitrary code by causing a long hostname or username to be inserted into a reply to a STAT command while a file is being transferred. • https://www.exploit-db.com/exploits/165 •

CVSS: 8.8EPSS: 5%CPEs: 1EXPL: 2

31 Dec 2004 — Ipswitch WS_FTP Server 4.0.2 allows remote authenticated users to execute arbitrary programs as SYSTEM by using the SITE command to modify certain iFtpSvc options that are handled by iftpmgr.exe. • http://marc.info/?l=bugtraq&m=108006581418116&w=2 •

CVSS: 7.5EPSS: 29%CPEs: 1EXPL: 2

08 Dec 2004 — Multiple buffer overflows in WS_FTP Server 5.03 2004.10.14 allow remote attackers to cause a denial of service (service crash) via long (1) SITE, (2) XMKD, (3) MKD, and (4) RNFR commands. • https://www.exploit-db.com/exploits/664 •

CVSS: 6.5EPSS: 5%CPEs: 1EXPL: 1

29 Aug 2004 — WS_FTP 5.0.2 allows remote authenticated users to cause a denial of service (CPU consumption) via a CD command that contains an invalid path with a "../" sequence. • https://www.exploit-db.com/exploits/24416 •

CVSS: 9.8EPSS: 0%CPEs: 24EXPL: 2

23 Mar 2004 — Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access. • http://marc.info/?l=bugtraq&m=108006581418116&w=2 •

CVSS: 8.8EPSS: 81%CPEs: 2EXPL: 2

12 Sep 2003 — Multiple buffer overflows in WS_FTP 3 and 4 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via long (1) APPE (append) or (2) STAT (status) arguments. Múltiples desboradamientos de búfer en WS_FTP 3 y 4 permite a usuarios remotos autenticados causar una denegación de servicio y posiblemente ejecutar código arbitrario mediaten argumentos APPEND o STAT (estado) largos. • https://www.exploit-db.com/exploits/23100 •

CVSS: 8.8EPSS: 5%CPEs: 1EXPL: 0

12 Aug 2002 — Buffer overflow in WS_FTP FTP Server 3.1.1 allows remote authenticated users to execute arbitrary code via a long SITE CPWD command. • http://www.atstake.com/research/advisories/2002/a080802-1.txt •

CVSS: 10.0EPSS: 84%CPEs: 1EXPL: 3

26 Jul 2001 — Buffer overflows in WS_FTP 2.02 allow remote attackers to execute arbitrary code via long arguments to (1) DELE, (2) MDTM, (3) MLST, (4) MKD, (5) RMD, (6) RNFR, (7) RNTO, (8) SIZE, (9) STAT, (10) XMKD, or (11) XRMD. • https://www.exploit-db.com/exploits/1158 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

02 Feb 1999 — WS_FTP server remote denial of service through cwd command. • http://www.eeye.com/html/Research/Advisories/AD02021999.html •