CVE-2004-2673
https://notcve.org/view.php?id=CVE-2004-2673
Multiple buffer overflows in ArGoSoft FTP Server before 1.4.1.6 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via (1) a SITE ZIP command with a long first or second argument, or (2) a SITE COPY with a long argument. • http://secunia.com/advisories/11002 http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx http://www.osvdb.org/11334 http://www.securiteam.com/windowsntfocus/5RP010KCAO.html http://www.securityfocus.com/bid/9770 https://exchange.xforce.ibmcloud.com/vulnerabilities/15410 •
CVE-2004-2674
https://notcve.org/view.php?id=CVE-2004-2674
Directory traversal vulnerability in ArGoSoft FTP Server before 1.4.1.6 allows remote authenticated users to determine the existence of arbitrary files via ".." sequences in the SITE UNZIP argument. • http://secunia.com/advisories/11002 http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx http://www.osvdb.org/11333 http://www.securiteam.com/windowsntfocus/5RP010KCAO.html http://www.securityfocus.com/bid/9770 https://exchange.xforce.ibmcloud.com/vulnerabilities/15411 •
CVE-2004-2672
https://notcve.org/view.php?id=CVE-2004-2672
Unspecified vulnerability in ArGoSoft FTP server before 1.4.2.2 allows attackers to upload .lnk files via unknown vectors. • http://www.argosoft.com/rootpages/FtpServer/ChangeList.aspx •
CVE-2000-1194
https://notcve.org/view.php?id=CVE-2000-1194
Argosoft FRP server 1.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to the (1) USER or (2) CWD commands. • http://www.mdma.za.net/fk/FK9.zip http://www.securityfocus.com/bid/1227 •
CVE-2001-1142 – ArGoSoft FTP Server 1.2.2.2 - Weak Password Encryption
https://notcve.org/view.php?id=CVE-2001-1142
ArGoSoft FTP Server 1.2.2.2 uses weak encryption for user passwords, which allows an attacker with access to the password file to gain privileges. • https://www.exploit-db.com/exploits/21009 http://www.iss.net/security_center/static/6848.php http://www.securityfocus.com/archive/1/196968 http://www.securityfocus.com/bid/3029 •