Arbitrary code execution risk in jftpgw due to format string vulnerability in log functions.
Reporter | Title | Published | Views | Family All 14 |
---|---|---|---|---|
![]() | FreeBSD Ports: jftpgw | 4 Sep 200800:00 | – | openvas |
![]() | FreeBSD Ports: jftpgw | 4 Sep 200800:00 | – | openvas |
![]() | Debian Security Advisory DSA 510-1 (jftpgw) | 17 Jan 200800:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-510) | 17 Jan 200800:00 | – | openvas |
![]() | [SECURITY] [DSA 510-1] New jftpgw packages fix format string vulnerability | 31 May 200400:00 | – | securityvulns |
![]() | FreeBSD : Arbitrary code execution via a format string vulnerability in jftpgw (65a17a3f-ed6e-11d8-aff1-00061bc2ad93) | 23 Apr 200900:00 | – | nessus |
![]() | FreeBSD : Arbitrary code execution via a format string vulnerability in jftpgw (82) | 13 Aug 200400:00 | – | nessus |
![]() | Debian DSA-510-1 : jftpgw - format string | 29 Sep 200400:00 | – | nessus |
![]() | CVE-2004-0448 | 6 Dec 200405:00 | – | cve |
![]() | CAN-2004-0448 | 6 Aug 202410:05 | – | cve |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | jftpgw | 0.13.5 | UNKNOWN |
Source | Link |
---|---|
debian | www.debian.org/security/2004/dsa-510 |
xforce | www.xforce.iss.net/xforce/xfdb/16271 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo