CVE-2018-25226
- EPSS 0.01%
- Veröffentlicht 30.03.2026 11:02:19
- Zuletzt bearbeitet 31.03.2026 19:24:49
FTPShell Server 6.83 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an excessively long string in the account name field. Attackers can trigger a denial of service by pasting a 417-byte payl...
CVE-2019-25619
- EPSS 0.01%
- Veröffentlicht 22.03.2026 13:38:50
- Zuletzt bearbeitet 03.04.2026 14:33:32
FTP Shell Server 6.83 contains a buffer overflow vulnerability in the 'Account name to ban' field that allows local attackers to execute arbitrary code by supplying a crafted string. Attackers can inject shellcode through the account name parameter i...
CVE-2020-18077
- EPSS 0.39%
- Veröffentlicht 17.12.2021 17:15:10
- Zuletzt bearbeitet 21.11.2024 05:08:22
A buffer overflow vulnerability in the Virtual Path Mapping component of FTPShell v6.83 allows attackers to cause a denial of service (DoS).
CVE-2009-0349
- EPSS 25.87%
- Veröffentlicht 29.01.2009 19:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Stack-based buffer overflow in FTPShell Server 4.3 allows user-assisted remote attackers to cause a denial of service (persistent daemon crash) and possibly execute arbitrary code via a long string in a licensing key (aka .key) file.
CVE-2005-2426
- EPSS 1.11%
- Veröffentlicht 03.08.2005 04:00:00
- Zuletzt bearbeitet 16.04.2026 00:27:16
FTPshell Server 3.38 allows remote authenticated users to cause a denial of service (application crash) by multiple connections and disconnections without using the QUIT command.