CVE-2007-0330
https://notcve.org/view.php?id=CVE-2007-0330
Buffer overflow in wsbho2k0.dll, as used by wsftpurl.exe, in Ipswitch WS_FTP 2007 Professional allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long ftp:// URL in an HTML document, and possibly other vectors. Desbordamiento de búfer en wsbho2k0.dll, como ha sido utilizado en wsftpurl.exe, en Ipswitch WS_FTP 2007 Professional permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) y posiblemente ejecutar código de su elección mediante una URL larga del tipo ftp:// en un documento HTML, y posiblemente otros vectores. • http://osvdb.org/33476 http://securityreason.com/securityalert/2160 http://www.securityfocus.com/archive/1/456755/100/0/threaded http://www.securityfocus.com/archive/1/456901/100/0/threaded http://www.securityfocus.com/archive/1/457097/100/0/threaded http://www.securityfocus.com/bid/22062 •
CVE-2006-5001
https://notcve.org/view.php?id=CVE-2006-5001
Unspecified vulnerability in the log analyzer in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, prevents certain sensitive information from being displayed in the (1) Files and (2) Summary tabs. NOTE: in the early publication of this identifier on 20060926, the description was used for the wrong issue. Vulnerabilidad no especificada en el analizador de log en WS_FTP Server 5.05 anterior a Hotfix 1, y posiblemente versiones anteriores a la 5.0, previene que cierta información sensible sea mostrada en las pestañas (1) Files y (2) Summary. NOTA: en la publicación anterior de este identificador en 26/09/2006, la descripción fue usada para el asunto equivocado. • http://www.ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp •
CVE-2006-5000 – Ipswitch WS_FTP Server Checksum Command Parsing Buffer Overflow Vulnerabilities
https://notcve.org/view.php?id=CVE-2006-5000
Multiple buffer overflows in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, have unknown impact and remote authenticated attack vectors via the (1) XCRC, (2) XMD5, and (3) XSHA1 commands. NOTE: in the early publication of this identifier on 20060926, the description was used for the wrong issue. Múltiples desbordamientos de búfer en WS_FTP Server 5.05 anterior a Hotfix 1, y posiblemente otras versiones anteriores a la 5.0, tienen impacto y vectores de ataque remotos autenticados desconocidos mediante los comandos (1) XCRC, (2) XMD5, y (3) XSHA1. NOTA: en la publicación anterior de este identificador en 26/09/2006, la descripción fue usada por el asunto equivocado. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Ipswitch WS_FTP Server. • http://securitytracker.com/id?1016935 http://www.ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp http://www.securityfocus.com/archive/1/447077/100/0/threaded http://www.zerodayinitiative.com/advisories/ZDI-06-029.html https://exchange.xforce.ibmcloud.com/vulnerabilities/41829 •
CVE-2006-4974 – Ipswitch WS_FTP LE 5.08 - PASV Response Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2006-4974
Buffer overflow in Ipswitch WS_FTP Limited Edition (LE) 5.08 allows remote FTP servers to execute arbitrary code via a long response to a PASV command. Desbordamiento de búfer en Ipswitch WS_FTP Limited Edition (LE) 5.08 permite a un a servidores FTP remotos ejecutar código de su elección a través de un repuesta grande a un comando PASV. • https://www.exploit-db.com/exploits/2401 http://secunia.com/advisories/22032 http://www.osvdb.org/29125 http://www.securityfocus.com/bid/20121 https://exchange.xforce.ibmcloud.com/vulnerabilities/29074 •
CVE-2006-4847 – Ipswitch WS_FTP Server 5.05 - XMD5 Overflow
https://notcve.org/view.php?id=CVE-2006-4847
Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands. Múltiples desbordamientos de búfer en Ipswitch WS_FTP Server 5.05 anterior al Hotfix 1 permiten a usuarios autenticados remotamente ejecutar código de su elección a través de comandos largos (1) XCRC, (2) XSHA1, o (3) XMD5. • https://www.exploit-db.com/exploits/16717 https://www.exploit-db.com/exploits/3335 http://ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp http://secunia.com/advisories/21932 http://www.osvdb.org/28939 http://www.securityfocus.com/bid/20076 http://www.vupen.com/english/advisories/2006/3655 https://exchange.xforce.ibmcloud.com/vulnerabilities/28983 •