Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Ws_ftp_pro
(Ipswitch)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 6 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2004-03-23 | CVE-2004-1884 | Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access. | Ws_ftp_pro, Ws_ftp_server, Ws_ftp_server | N/A | ||
2008-08-20 | CVE-2008-3734 | Format string vulnerability in Ipswitch WS_FTP Home 2007.0.0.2 and WS_FTP Professional 2007.1.0.0 allows remote FTP servers to cause a denial of service (application crash) or possibly execute arbitrary code via format string specifiers in a connection greeting (response). | Ws_ftp_home, Ws_ftp_pro | N/A | ||
2007-02-02 | CVE-2007-0665 | Format string vulnerability in the SCP module in Ipswitch WS_FTP 2007 Professional might allow remote attackers to execute arbitrary commands via format string specifiers in the filename, related to the SHELL WS_FTP script command. | Ws_ftp_pro | N/A | ||
2007-01-18 | CVE-2007-0330 | Buffer overflow in wsbho2k0.dll, as used by wsftpurl.exe, in Ipswitch WS_FTP 2007 Professional allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long ftp:// URL in an HTML document, and possibly other vectors. | Ws_ftp_pro | N/A | ||
2002-12-31 | CVE-2002-1851 | Buffer overflow in WS_FTP Pro 7.5 allows remote attackers to execute code on a client system via unknown attack vectors. | Ws_ftp_pro | N/A | ||
1999-07-29 | CVE-1999-1078 | WS_FTP Pro 6.0 uses weak encryption for passwords in its initialization files, which allows remote attackers to easily decrypt the passwords and gain privileges. | Ws_ftp_pro | N/A |