6 results (0.008 seconds)

CVSS: 7.2EPSS: 0%CPEs: 23EXPL: 0

wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead. wu-ftpd 2.6.2 y anteriores, con la opción restricted-gid activada, permite a usuarios locales saltarse restricciones de acceso cambiando los permisos para impedir el acceso a su directorio home, lo que hace que wu-ftpd use el directorio raíz en su lugar. • http://marc.info/?l=bugtraq&m=108999466902690&w=2 http://secunia.com/advisories/11055 http://secunia.com/advisories/20168 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102356-1 http://www.debian.org/security/2004/dsa-457 http://www.frsirt.com/english/advisories/2006/1867 http://www.redhat.com/support/errata/RHSA-2004-096.html http://www.securityfocus.com/bid/9832 https://exchange.xforce.ibmcloud.com/vulnerabilities/15423 https://oval.cisecurity.org/repository •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator. • http://archives.neohapsis.com/archives/bugtraq/2003-09/0348.html http://secunia.com/advisories/9835 http://securitytracker.com/id?1007775 http://www.osvdb.org/2594 http://www.securityfocus.com/bid/8668 http://www.slackware.org/security/viewer.php?l=slackware-security&y=2003&m=slackware-security.365971 https://exchange.xforce.ibmcloud.com/vulnerabilities/13269 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Vulnerability in wu-ftpd 2.6.0, and possibly earlier versions, which is unrelated to the ftpglob bug described in CVE-2001-0550. • http://www.novell.com/linux/security/advisories/2001_043_wuftpd_txt.html •

CVSS: 7.5EPSS: 1%CPEs: 32EXPL: 0

FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

wu-ftpd 2.4 FTP server does not properly drop privileges when an ABOR (abort file transfer) command is executed during a file transfer, which causes a signal to be handled incorrectly and allows local and possibly remote attackers to read arbitrary files. • http://marc.info/?l=bugtraq&m=87602167420401&w=2 http://marc.info/?l=bugtraq&m=87602167420408&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/7169 •