Vulnerabilities (CVE)

Filtered by vendor Progress Subscribe
Filtered by product Ws Ftp Server
Total 27 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2003-0772 2 Ipswitch, Progress 2 Ws Ftp Server, Ws Ftp Server 2024-11-20 7.5 HIGH N/A
Multiple buffer overflows in WS_FTP 3 and 4 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via long (1) APPE (append) or (2) STAT (status) arguments.
CVE-2002-0826 1 Progress 1 Ws Ftp Server 2024-11-20 7.5 HIGH N/A
Buffer overflow in WS_FTP FTP Server 3.1.1 allows remote authenticated users to execute arbitrary code via a long SITE CPWD command.
CVE-2001-1021 1 Progress 1 Ws Ftp Server 2024-11-20 7.5 HIGH N/A
Buffer overflows in WS_FTP 2.02 allow remote attackers to execute arbitrary code via long arguments to (1) DELE, (2) MDTM, (3) MLST, (4) MKD, (5) RMD, (6) RNFR, (7) RNTO, (8) SIZE, (9) STAT, (10) XMKD, or (11) XRMD.
CVE-1999-1171 2 Ipswitch, Progress 2 Imail, Ws Ftp Server 2024-11-20 4.6 MEDIUM N/A
IPswitch WS_FTP allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.
CVE-1999-1170 2 Ipswitch, Progress 2 Imail, Ws Ftp Server 2024-11-20 4.6 MEDIUM N/A
IPswitch IMail allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.
CVE-2024-7745 1 Progress 1 Ws Ftp Server 2024-09-04 N/A 8.1 HIGH
In WS_FTP Server versions before 8.8.8 (2022.0.8), a Missing Critical Step in Multi-Factor Authentication of the Web Transfer Module allows users to skip the second-factor verification and log in with username and password only.
CVE-2024-7744 1 Progress 1 Ws Ftp Server 2024-09-04 N/A 6.5 MEDIUM
In WS_FTP Server versions before 8.8.8 (2022.0.8), an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Web Transfer Module allows File Discovery, Probe System Files, User-Controlled Filename, Path Traversal.   An authenticated file download flaw has been identified where a user can craft an API call that allows them to download a file from an arbitrary folder on the drive where that user host's root folder is located (by default this is C:)