CVE-2004-1884
https://notcve.org/view.php?id=CVE-2004-1884
Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access. • http://marc.info/?l=bugtraq&m=108006581418116&w=2 http://secunia.com/advisories/11206 http://www.securityfocus.com/bid/9953 https://exchange.xforce.ibmcloud.com/vulnerabilities/15558 •
CVE-2003-0772 – Ipswitch WS_FTP Server 3.4/4.0 - FTP Command Buffer Overrun
https://notcve.org/view.php?id=CVE-2003-0772
Multiple buffer overflows in WS_FTP 3 and 4 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via long (1) APPE (append) or (2) STAT (status) arguments. Múltiples desboradamientos de búfer en WS_FTP 3 y 4 permite a usuarios remotos autenticados causar una denegación de servicio y posiblemente ejecutar código arbitrario mediaten argumentos APPEND o STAT (estado) largos. • https://www.exploit-db.com/exploits/23100 http://marc.info/?l=bugtraq&m=106288825902868&w=2 http://secunia.com/advisories/9671 http://www.kb.cert.org/vuls/id/219140 http://www.kb.cert.org/vuls/id/792284 http://www.securityfocus.com/bid/8542 https://exchange.xforce.ibmcloud.com/vulnerabilities/13119 •
CVE-2002-0826
https://notcve.org/view.php?id=CVE-2002-0826
Buffer overflow in WS_FTP FTP Server 3.1.1 allows remote authenticated users to execute arbitrary code via a long SITE CPWD command. • http://www.atstake.com/research/advisories/2002/a080802-1.txt http://www.ipswitch.com/Support/WS_FTP-Server/patch-upgrades.html http://www.iss.net/security_center/static/9794.php http://www.securityfocus.com/bid/5427 •
CVE-2001-1021 – Ipswitch WS_FTP Server 5.03 - 'RNFR' Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-1021
Buffer overflows in WS_FTP 2.02 allow remote attackers to execute arbitrary code via long arguments to (1) DELE, (2) MDTM, (3) MLST, (4) MKD, (5) RMD, (6) RNFR, (7) RNTO, (8) SIZE, (9) STAT, (10) XMKD, or (11) XRMD. • https://www.exploit-db.com/exploits/1158 https://www.exploit-db.com/exploits/21036 http://archives.neohapsis.com/archives/bugtraq/2001-07/0610.html http://www.ipswitch.com/Support/WS_FTP-Server/patch-upgrades.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6911 •
CVE-1999-1171 – Ipswitch IMail 5.0 / Ipswitch WS_FTP Server 1.0.1/1.0.2 - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1171
IPswitch WS_FTP allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920. • https://www.exploit-db.com/exploits/19167 http://marc.info/?l=ntbugtraq&m=91816507920544&w=2 http://www.securityfocus.com/bid/218 •