Lucene search

K
IpswitchWs Ftp Pro

6 matches found

CVE
CVE
added 2005/05/10 4:0 a.m.45 views

CVE-2004-1884

Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access.

7.5CVSS6.9AI score0.00301EPSS
CVE
CVE
added 2001/09/12 4:0 a.m.38 views

CVE-1999-1078

WS_FTP Pro 6.0 uses weak encryption for passwords in its initialization files, which allows remote attackers to easily decrypt the passwords and gain privileges.

7.5CVSS6.9AI score0.01011EPSS
CVE
CVE
added 2007/02/02 9:28 p.m.37 views

CVE-2007-0665

Format string vulnerability in the SCP module in Ipswitch WS_FTP 2007 Professional might allow remote attackers to execute arbitrary commands via format string specifiers in the filename, related to the SHELL WS_FTP script command.

6.8CVSS7.6AI score0.002EPSS
CVE
CVE
added 2008/08/20 4:41 p.m.36 views

CVE-2008-3734

Format string vulnerability in Ipswitch WS_FTP Home 2007.0.0.2 and WS_FTP Professional 2007.1.0.0 allows remote FTP servers to cause a denial of service (application crash) or possibly execute arbitrary code via format string specifiers in a connection greeting (response).

9.3CVSS7.9AI score0.68888EPSS
CVE
CVE
added 2005/06/28 4:0 a.m.30 views

CVE-2002-1851

Buffer overflow in WS_FTP Pro 7.5 allows remote attackers to execute code on a client system via unknown attack vectors.

7.5CVSS7.8AI score0.03279EPSS
CVE
CVE
added 2007/01/18 2:28 a.m.25 views

CVE-2007-0330

Buffer overflow in wsbho2k0.dll, as used by wsftpurl.exe, in Ipswitch WS_FTP 2007 Professional allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long ftp:// URL in an HTML document, and possibly other vectors.

7.5CVSS7.9AI score0.00509EPSS