Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ipswitch ws ftp 5.03 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-5000
Multiple buffer overflows in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, have unknown impact and remote authenticated attack vectors via the (1) XCRC, (2) XMD5, and (3) XSHA1 commands. NOTE: in the early publication of this identifier on 20060926,...
Ipswitch Ws Ftp Server 5.02
Ipswitch Ws Ftp Server 5.05
Ipswitch Ws Ftp Server 5.03
Progress Ws Ftp Server 5.0.2
NA
CVE-2008-5692
Ipswitch WS_FTP Server Manager prior to 6.1.1, and possibly other Ipswitch products, allows remote malicious users to bypass authentication and read logs via a logLogout action to FTPLogServer/login.asp followed by a request to FTPLogServer/LogViewer.asp with the localhostnull ac...
Ipswitch Ws Ftp 4.02
Ipswitch Ws Ftp 4.01
Ipswitch Ws Ftp 3.1.1
Ipswitch Ws Ftp 3.1.2
Ipswitch Ws Ftp
Ipswitch Ws Ftp 5.05
Ipswitch Ws Ftp 1.0.5
Ipswitch Ws Ftp 4.00
Ipswitch Ws Ftp 3.1.3
Ipswitch Ws Ftp 5.01
Ipswitch Ws Ftp 2.02
Ipswitch Ws Ftp 5.02
Ipswitch Ws Ftp 3.1.0
Ipswitch Ws Ftp 5.00
Ipswitch Ws Ftp 3.0
Ipswitch Ws Ftp 2.03
Ipswitch Ws Ftp 3.14
Ipswitch Ws Ftp 5.03
Ipswitch Ws Ftp 5.04
Ipswitch Ws Ftp 6.0
Ipswitch Ws Ftp 3.0.1
Ipswitch Ws Ftp 2.01
1 EDB exploit
NA
CVE-2008-5693
Ipswitch WS_FTP Server Manager 6.1.0.0 and previous versions, and possibly other Ipswitch products, might allow remote malicious users to read the contents of custom ASP files in WSFTPSVR/ via a request with an appended dot character.
Ipswitch Ws Ftp
Ipswitch Ws Ftp 5.05
Ipswitch Ws Ftp 1.0.5
Ipswitch Ws Ftp 4.00
Ipswitch Ws Ftp 3.1.3
Ipswitch Ws Ftp 5.01
Ipswitch Ws Ftp 2.02
Ipswitch Ws Ftp 5.02
Ipswitch Ws Ftp 3.1.0
Ipswitch Ws Ftp 5.00
Ipswitch Ws Ftp 3.0
Ipswitch Ws Ftp 2.03
Ipswitch Ws Ftp 3.14
Ipswitch Ws Ftp 5.03
Ipswitch Ws Ftp 5.04
Ipswitch Ws Ftp 6.0
Ipswitch Ws Ftp 3.0.1
Ipswitch Ws Ftp 2.01
Ipswitch Ws Ftp 4.02
Ipswitch Ws Ftp 4.01
Ipswitch Ws Ftp 3.1.1
Ipswitch Ws Ftp 3.1.2
NA
CVE-2006-5001
Unspecified vulnerability in the log analyzer in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, prevents certain sensitive information from being displayed in the (1) Files and (2) Summary tabs. NOTE: in the early publication of this identifier on 20...
Ipswitch Ws Ftp Server 5.02
Ipswitch Ws Ftp Server 5.03
Progress Ws Ftp Server 5.0.2
Progress Ws Ftp Server
NA
CVE-2004-1135
Multiple buffer overflows in WS_FTP Server 5.03 2004.10.14 allow remote malicious users to cause a denial of service (service crash) via long (1) SITE, (2) XMKD, (3) MKD, and (4) RNFR commands.
Ipswitch Ws Ftp Server 5.03
2 EDB exploits
NA
CVE-2006-4847
Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands.
Ipswitch Ws Ftp Server 5.02
Ipswitch Ws Ftp Server 4.01
Ipswitch Ws Ftp Server 3.0 1
Ipswitch Ws Ftp Server 1.0.1eval
Ipswitch Ws Ftp Server 5.03
Ipswitch Ws Ftp Server 1.0.2eval
Progress Ws Ftp Server 1.0.1
Progress Ws Ftp Server 1.0.1.e
Progress Ws Ftp Server 1.0.2
Progress Ws Ftp Server 1.0.2.e
Progress Ws Ftp Server 1.0.3
Progress Ws Ftp Server 1.0.4
Progress Ws Ftp Server 1.0.5
Progress Ws Ftp Server 2.0
Progress Ws Ftp Server 2.0.1
Progress Ws Ftp Server 2.0.2
Progress Ws Ftp Server 2.0.3
Progress Ws Ftp Server 2.0.4
Progress Ws Ftp Server 3.0
Progress Ws Ftp Server 3.1
Progress Ws Ftp Server 3.1.1
Progress Ws Ftp Server 3.1.2
2 EDB exploits
NA
CVE-2001-1021
Buffer overflows in WS_FTP 2.02 allow remote malicious users to execute arbitrary code via long arguments to (1) DELE, (2) MDTM, (3) MLST, (4) MKD, (5) RMD, (6) RNFR, (7) RNTO, (8) SIZE, (9) STAT, (10) XMKD, or (11) XRMD.
Progress Ws Ftp Server 2.0.2
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started