CVE-2023-40044
- EPSS 94.43%
- Published 27.09.2023 15:18:57
- Last modified 10.03.2025 20:32:25
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.
CVE-2022-27665
- EPSS 1.25%
- Published 03.04.2023 14:15:07
- Last modified 21.11.2024 06:56:07
Reflected XSS (via AngularJS sandbox escape expressions) exists in Progress Ipswitch WS_FTP Server 8.6.0. This can lead to execution of malicious code and commands on the client due to improper handling of user-provided input. By inputting malicious ...
CVE-2023-24029
- EPSS 0.16%
- Published 03.02.2023 21:15:11
- Last modified 26.03.2025 19:15:23
In Progress WS_FTP Server before 8.8, it is possible for a host administrator to elevate their privileges via the administrative interface due to insufficient authorization controls applied on user modification workflows.
CVE-2019-12143
- EPSS 0.01%
- Published 11.06.2019 21:29:01
- Last modified 21.11.2024 04:22:18
A Directory Traversal issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1. An attacker can supply a string using special patterns via the SCP protocol to disclose WS_FTP usernames as well as filenames.
- EPSS 2.3%
- Published 05.02.2008 12:00:00
- Last modified 09.04.2025 00:30:58
Buffer overflow in Ipswitch WS_FTP Server with SSH 6.1.0.0 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long opendir command.
- EPSS 14.19%
- Published 26.09.2006 20:07:00
- Last modified 09.04.2025 00:30:58
Unspecified vulnerability in the log analyzer in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, prevents certain sensitive information from being displayed in the (1) Files and (2) Summary tabs. NOTE: in the early publi...
CVE-2006-5000
- EPSS 24.86%
- Published 26.09.2006 20:07:00
- Last modified 09.04.2025 00:30:58
Multiple buffer overflows in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, have unknown impact and remote authenticated attack vectors via the (1) XCRC, (2) XMD5, and (3) XSHA1 commands. NOTE: in the early publication ...
CVE-2006-4847
- EPSS 89.53%
- Published 19.09.2006 01:07:00
- Last modified 03.04.2025 01:03:51
Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands.
CVE-2004-1885
- EPSS 5.25%
- Published 31.12.2004 05:00:00
- Last modified 03.04.2025 01:03:51
Ipswitch WS_FTP Server 4.0.2 allows remote authenticated users to execute arbitrary programs as SYSTEM by using the SITE command to modify certain iFtpSvc options that are handled by iftpmgr.exe.
CVE-2004-1883
- EPSS 2.54%
- Published 31.12.2004 05:00:00
- Last modified 03.04.2025 01:03:51
Multiple buffer overflows in Ipswitch WS_FTP Server 4.0.2 (1) allow remote authenticated users to execute arbitrary code by causing a large error string to be generated by the ALLO handler, or (2) may allow remote FTP administrators to execute arbitr...