Format string vulnerability in wu-ftp 2.6.1 and previous versions, when running with debug mode enabled, allows remote malicious users to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
washington university wu-ftpd 2.4.2_beta18_vr12 |
||
washington university wu-ftpd 2.4.2_beta18_vr13 |
||
washington university wu-ftpd 2.4.2_beta18_vr8 |
||
washington university wu-ftpd 2.4.2_beta18_vr9 |
||
washington university wu-ftpd 2.4.1 |
||
washington university wu-ftpd 2.4.2_beta18 |
||
washington university wu-ftpd 2.4.2_beta18_vr4 |
||
washington university wu-ftpd 2.4.2_beta18_vr5 |
||
washington university wu-ftpd 2.4.2_vr17 |
||
washington university wu-ftpd 2.5 |
||
washington university wu-ftpd 2.4.2_beta18_vr10 |
||
washington university wu-ftpd 2.4.2_beta18_vr11 |
||
washington university wu-ftpd 2.4.2_beta18_vr6 |
||
washington university wu-ftpd 2.4.2_beta18_vr7 |
||
washington university wu-ftpd 2.6 |
||
washington university wu-ftpd 2.4.2_beta18_vr14 |
||
washington university wu-ftpd 2.4.2_beta18_vr15 |
||
washington university wu-ftpd 2.4.2_beta9 |
||
washington university wu-ftpd 2.4.2_vr16 |