Ipswitch WS_FTP Server 4.0.2 allows remote malicious users to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ipswitch ws ftp server 4.01 |
||
ipswitch ws ftp server 3.0_1 |
||
progress ws ftp server 1.0.1 |
||
progress ws ftp server 1.0.2 |
||
progress ws ftp server 1.0.3 |
||
progress ws ftp server 1.0.4 |
||
progress ws ftp server 1.0.5 |
||
progress ws ftp server 2.0 |
||
progress ws ftp server 2.0.1 |
||
progress ws ftp server 2.0.2 |
||
progress ws ftp server 2.0.3 |
||
progress ws ftp server 2.0.4 |
||
progress ws ftp server 3.0 |
||
progress ws ftp server 3.1 |
||
progress ws ftp server 3.1.1 |
||
progress ws ftp server 3.1.2 |
||
progress ws ftp server 3.1.3 |
||
progress ws ftp server 3.4 |
||
progress ws ftp server 4.0 |
||
progress ws ftp server 4.0.2 |