Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Ws_ftp_server
(Ipswitch)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 13 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2003-09-22 | CVE-2003-0772 | Multiple buffer overflows in WS_FTP 3 and 4 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via long (1) APPE (append) or (2) STAT (status) arguments. | Ws_ftp_server, Ws_ftp_server | N/A | ||
2004-03-23 | CVE-2004-1884 | Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access. | Ws_ftp_pro, Ws_ftp_server, Ws_ftp_server | N/A | ||
2004-12-31 | CVE-2004-1848 | Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file. | Ws_ftp_server, Ws_ftp_server | N/A |