CVE-2006-4974 – Ipswitch WS_FTP LE 5.08 - PASV Response Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2006-4974
Buffer overflow in Ipswitch WS_FTP Limited Edition (LE) 5.08 allows remote FTP servers to execute arbitrary code via a long response to a PASV command. Desbordamiento de búfer en Ipswitch WS_FTP Limited Edition (LE) 5.08 permite a un a servidores FTP remotos ejecutar código de su elección a través de un repuesta grande a un comando PASV. • https://www.exploit-db.com/exploits/2401 http://secunia.com/advisories/22032 http://www.osvdb.org/29125 http://www.securityfocus.com/bid/20121 https://exchange.xforce.ibmcloud.com/vulnerabilities/29074 •
CVE-2006-4847 – Ipswitch WS_FTP Server 5.05 - XMD5 Overflow
https://notcve.org/view.php?id=CVE-2006-4847
Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands. Múltiples desbordamientos de búfer en Ipswitch WS_FTP Server 5.05 anterior al Hotfix 1 permiten a usuarios autenticados remotamente ejecutar código de su elección a través de comandos largos (1) XCRC, (2) XSHA1, o (3) XMD5. • https://www.exploit-db.com/exploits/16717 https://www.exploit-db.com/exploits/3335 http://ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp http://secunia.com/advisories/21932 http://www.osvdb.org/28939 http://www.securityfocus.com/bid/20076 http://www.vupen.com/english/advisories/2006/3655 https://exchange.xforce.ibmcloud.com/vulnerabilities/28983 •
CVE-2004-1885
https://notcve.org/view.php?id=CVE-2004-1885
Ipswitch WS_FTP Server 4.0.2 allows remote authenticated users to execute arbitrary programs as SYSTEM by using the SITE command to modify certain iFtpSvc options that are handled by iftpmgr.exe. • http://marc.info/?l=bugtraq&m=108006581418116&w=2 http://secunia.com/advisories/11206 http://www.securityfocus.com/bid/9953 https://exchange.xforce.ibmcloud.com/vulnerabilities/15558 •
CVE-2004-1848
https://notcve.org/view.php?id=CVE-2004-1848
Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file. • http://marc.info/?l=bugtraq&m=108006717731989&w=2 http://secunia.com/advisories/11206 http://securitytracker.com/id?1009529 http://www.osvdb.org/4542 http://www.securityfocus.com/bid/9953 https://exchange.xforce.ibmcloud.com/vulnerabilities/15560 https://exchange.xforce.ibmcloud.com/vulnerabilities/41831 • CWE-399: Resource Management Errors •
CVE-2004-1883 – Ipswitch WS_FTP Server 4.0.2 - ALLO Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-1883
Multiple buffer overflows in Ipswitch WS_FTP Server 4.0.2 (1) allow remote authenticated users to execute arbitrary code by causing a large error string to be generated by the ALLO handler, or (2) may allow remote FTP administrators to execute arbitrary code by causing a long hostname or username to be inserted into a reply to a STAT command while a file is being transferred. • https://www.exploit-db.com/exploits/165 http://marc.info/?l=bugtraq&m=108006553222397&w=2 http://secunia.com/advisories/11206 http://www.securityfocus.com/archive/1/358361 http://www.securityfocus.com/bid/9953 https://exchange.xforce.ibmcloud.com/vulnerabilities/15561 •