Page 3 of 23 results (0.004 seconds)

CVSS: 8.8EPSS: 5%CPEs: 1EXPL: 2

31 Dec 2004 — Ipswitch WS_FTP Server 4.0.2 allows remote authenticated users to execute arbitrary programs as SYSTEM by using the SITE command to modify certain iFtpSvc options that are handled by iftpmgr.exe. • http://marc.info/?l=bugtraq&m=108006581418116&w=2 •

CVSS: 9.8EPSS: 0%CPEs: 24EXPL: 2

23 Mar 2004 — Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access. • http://marc.info/?l=bugtraq&m=108006581418116&w=2 •

CVSS: 8.8EPSS: 81%CPEs: 2EXPL: 2

12 Sep 2003 — Multiple buffer overflows in WS_FTP 3 and 4 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via long (1) APPE (append) or (2) STAT (status) arguments. Múltiples desboradamientos de búfer en WS_FTP 3 y 4 permite a usuarios remotos autenticados causar una denegación de servicio y posiblemente ejecutar código arbitrario mediaten argumentos APPEND o STAT (estado) largos. • https://www.exploit-db.com/exploits/23100 •