CVE-2023-40044
- EPSS 94.43%
- Veröffentlicht 27.09.2023 15:18:57
- Zuletzt bearbeitet 10.03.2025 20:32:25
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.
CVE-2022-27665
- EPSS 1.25%
- Veröffentlicht 03.04.2023 14:15:07
- Zuletzt bearbeitet 21.11.2024 06:56:07
Reflected XSS (via AngularJS sandbox escape expressions) exists in Progress Ipswitch WS_FTP Server 8.6.0. This can lead to execution of malicious code and commands on the client due to improper handling of user-provided input. By inputting malicious ...
CVE-2023-24029
- EPSS 0.16%
- Veröffentlicht 03.02.2023 21:15:11
- Zuletzt bearbeitet 26.03.2025 19:15:23
In Progress WS_FTP Server before 8.8, it is possible for a host administrator to elevate their privileges via the administrative interface due to insufficient authorization controls applied on user modification workflows.
CVE-2019-12143
- EPSS 0.01%
- Veröffentlicht 11.06.2019 21:29:01
- Zuletzt bearbeitet 21.11.2024 04:22:18
A Directory Traversal issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1. An attacker can supply a string using special patterns via the SCP protocol to disclose WS_FTP usernames as well as filenames.
- EPSS 2.3%
- Veröffentlicht 05.02.2008 12:00:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Buffer overflow in Ipswitch WS_FTP Server with SSH 6.1.0.0 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long opendir command.
- EPSS 14.19%
- Veröffentlicht 26.09.2006 20:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Unspecified vulnerability in the log analyzer in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, prevents certain sensitive information from being displayed in the (1) Files and (2) Summary tabs. NOTE: in the early publi...
CVE-2006-5000
- EPSS 24.86%
- Veröffentlicht 26.09.2006 20:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Multiple buffer overflows in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, have unknown impact and remote authenticated attack vectors via the (1) XCRC, (2) XMD5, and (3) XSHA1 commands. NOTE: in the early publication ...
CVE-2006-4847
- EPSS 89.53%
- Veröffentlicht 19.09.2006 01:07:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands.
CVE-2004-1885
- EPSS 5.25%
- Veröffentlicht 31.12.2004 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Ipswitch WS_FTP Server 4.0.2 allows remote authenticated users to execute arbitrary programs as SYSTEM by using the SITE command to modify certain iFtpSvc options that are handled by iftpmgr.exe.
CVE-2004-1883
- EPSS 2.54%
- Veröffentlicht 31.12.2004 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Multiple buffer overflows in Ipswitch WS_FTP Server 4.0.2 (1) allow remote authenticated users to execute arbitrary code by causing a large error string to be generated by the ALLO handler, or (2) may allow remote FTP administrators to execute arbitr...