Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
texas imperial software wftpd pro 3.21 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2004-1642
WFTPD Pro Server 3.21 allows remote authenticated users to cause a denial of service (crash) via a series of long MLIST commands.
Texas Imperial Software Wftpd 3.21
Texas Imperial Software Wftpd 3.21 R1
Texas Imperial Software Wftpd 3.21 R2
Texas Imperial Software Wftpd 3.21 R3
1 EDB exploit
7.2
CVSSv2
CVE-2004-0340
Stack-based buffer overflow in WFTPD Pro Server 3.21 Release 1, Pro Server 3.20 Release 2, Server 3.21 Release 1, and Server 3.10 allows local users to execute arbitrary code via long (1) LIST, (2) NLST, or (3) STAT commands.
Texas Imperial Software Wftpd 3.0
Texas Imperial Software Wftpd 3.0 0r3
Texas Imperial Software Wftpd 3.21
Texas Imperial Software Wftpd Pro 3.10 R1
Texas Imperial Software Wftpd 3.0 0r5
Texas Imperial Software Wftpd 3.10 R1
Texas Imperial Software Wftpd 3.20
Texas Imperial Software Wftpd 3.0 0r4
Texas Imperial Software Wftpd Pro 3.20
Texas Imperial Software Wftpd Pro 3.21
1 EDB exploit
2.1
CVSSv2
CVE-2004-0341
WFTPD Pro Server 3.21 Release 1 allocates memory for a command until a 0Ah byte (newline) is sent, which allows local users to cause a denial of service (CPU consumption) by continuing to send a long command that does not contain a newline.
Texas Imperial Software Wftpd 3.0 0r4
Texas Imperial Software Wftpd 3.0 0r5
Texas Imperial Software Wftpd Pro 3.21
Texas Imperial Software Wftpd 3.0
Texas Imperial Software Wftpd 3.20
Texas Imperial Software Wftpd 3.21
Texas Imperial Software Wftpd 3.0 0r3
Texas Imperial Software Wftpd Pro 3.10 R1
Texas Imperial Software Wftpd Pro 3.20
Texas Imperial Software Wftpd 3.10 R1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started