CVE-2004-1883 – Ipswitch WS_FTP Server 4.0.2 - ALLO Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-1883
Multiple buffer overflows in Ipswitch WS_FTP Server 4.0.2 (1) allow remote authenticated users to execute arbitrary code by causing a large error string to be generated by the ALLO handler, or (2) may allow remote FTP administrators to execute arbitrary code by causing a long hostname or username to be inserted into a reply to a STAT command while a file is being transferred. • https://www.exploit-db.com/exploits/165 http://marc.info/?l=bugtraq&m=108006553222397&w=2 http://secunia.com/advisories/11206 http://www.securityfocus.com/archive/1/358361 http://www.securityfocus.com/bid/9953 https://exchange.xforce.ibmcloud.com/vulnerabilities/15561 •
CVE-2004-1643 – Ipswitch WS_FTP Server 5.0.x - CD Command Malformed File Path Remote Denial of Service
https://notcve.org/view.php?id=CVE-2004-1643
WS_FTP 5.0.2 allows remote authenticated users to cause a denial of service (CPU consumption) via a CD command that contains an invalid path with a "../" sequence. • https://www.exploit-db.com/exploits/24416 http://marc.info/?l=bugtraq&m=109389890712888&w=2 http://secunia.com/advisories/12406 http://www.securityfocus.com/bid/11065 https://exchange.xforce.ibmcloud.com/vulnerabilities/17155 •
CVE-2004-1884
https://notcve.org/view.php?id=CVE-2004-1884
Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access. • http://marc.info/?l=bugtraq&m=108006581418116&w=2 http://secunia.com/advisories/11206 http://www.securityfocus.com/bid/9953 https://exchange.xforce.ibmcloud.com/vulnerabilities/15558 •
CVE-2003-0772 – Ipswitch WS_FTP Server 3.4/4.0 - FTP Command Buffer Overrun
https://notcve.org/view.php?id=CVE-2003-0772
Multiple buffer overflows in WS_FTP 3 and 4 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via long (1) APPE (append) or (2) STAT (status) arguments. Múltiples desboradamientos de búfer en WS_FTP 3 y 4 permite a usuarios remotos autenticados causar una denegación de servicio y posiblemente ejecutar código arbitrario mediaten argumentos APPEND o STAT (estado) largos. • https://www.exploit-db.com/exploits/23100 http://marc.info/?l=bugtraq&m=106288825902868&w=2 http://secunia.com/advisories/9671 http://www.kb.cert.org/vuls/id/219140 http://www.kb.cert.org/vuls/id/792284 http://www.securityfocus.com/bid/8542 https://exchange.xforce.ibmcloud.com/vulnerabilities/13119 •
CVE-2003-0485
https://notcve.org/view.php?id=CVE-2003-0485
Buffer overflow in Progress 4GL Compiler 9.1D06 and earlier allows attackers to execute arbitrary code via source code containing a long, invalid data type. Desbordamiento de búfer en Progress 4GL Compiler 9.1D06 y anteriores permite a atacantes ejecutar código arbitrario mediante código fuente que contenga un tipo de datos no válido y largo. • http://marc.info/?l=bugtraq&m=105613243117155&w=2 http://www.securityfocus.com/bid/7997 •