8 results (0.024 seconds)

CVSS: 7.8EPSS: 0%CPEs: 23EXPL: 0

15 Apr 2004 — wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead. wu-ftpd 2.6.2 y anteriores, con la opción restricted-gid activada, permite a usuarios locales saltarse restricciones de acceso cambiando los permisos para impedir el acceso a su directorio home, lo que hace que wu-ftpd use el directorio raíz en su lugar. • http://marc.info/?l=bugtraq&m=108999466902690&w=2 •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

31 Dec 2003 — Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator. • http://archives.neohapsis.com/archives/bugtraq/2003-09/0348.html •

CVSS: 5.5EPSS: 0%CPEs: 26EXPL: 1

25 Oct 2003 — ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd. ls en los paquetes fileutils o coreutils permite a usuarios locales consumir una gran cantidad de memoria mediante un valor -w, lo que puede ser explotado remotamente mediante aplicaciones que usan ls, com wu-ftpd. • https://www.exploit-db.com/exploits/115 •

CVSS: 7.8EPSS: 0%CPEs: 26EXPL: 2

25 Oct 2003 — An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd. Un desbordamiento de enteros en ls en los paquetes fileutils o coreutils puede permitir a usuarios locales causar una denegación de servicio o ejecutar código arbitrario mediante un valor -w, lo que podría ser explotado remotamente mediante aplicaciones que usan ls, ... • https://www.exploit-db.com/exploits/23274 •

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 0

28 Nov 2001 — Vulnerability in wu-ftpd 2.6.0, and possibly earlier versions, which is unrelated to the ftpglob bug described in CVE-2001-0550. • http://www.novell.com/linux/security/advisories/2001_043_wuftpd_txt.html •

CVSS: 10.0EPSS: 11%CPEs: 19EXPL: 2

26 Mar 2001 — Format string vulnerability in wu-ftp 2.6.1 and earlier, when running with debug mode enabled, allows remote attackers to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment. • https://www.exploit-db.com/exploits/20594 •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

23 Sep 1997 — Race condition in wu-ftpd and BSDI ftpd allows remote attackers to gain root access via the SITE EXEC command. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0955 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

01 Jan 1997 — The GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands. • https://www.cve.org/CVERecord?id=CVE-1999-0202 •