Lucene search

K
Washington UniversityWu-ftpd2.4.2 beta18 vr13

6 matches found

CVE
CVE
added 2004/09/01 4:0 a.m.63 views

CVE-2004-0148

wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.

7.2CVSS8.8AI score0.00033EPSS
CVE
CVE
added 2003/11/17 5:0 a.m.57 views

CVE-2003-0854

ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.

2.1CVSS5.8AI score0.00234EPSS
CVE
CVE
added 2001/05/07 4:0 a.m.48 views

CVE-2001-0187

Format string vulnerability in wu-ftp 2.6.1 and earlier, when running with debug mode enabled, allows remote attackers to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment.

10CVSS7.3AI score0.08089EPSS
CVE
CVE
added 2000/01/04 5:0 a.m.47 views

CVE-1999-0878

Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via MAPPING_CHDIR.

10CVSS7.3AI score0.01346EPSS
CVE
CVE
added 2003/11/17 5:0 a.m.45 views

CVE-2003-0853

An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.

5CVSS7.3AI score0.02438EPSS
CVE
CVE
added 2000/07/19 4:0 a.m.44 views

CVE-2000-0574

FTP servers such as OpenBSD ftpd, NetBSD ftpd, ProFTPd and Opieftpd do not properly cleanse untrusted format strings that are used in the setproctitle function (sometimes called by set_proc_title), which allows remote attackers to cause a denial of service or execute arbitrary commands.

5CVSS7.5AI score0.12738EPSS