Total
21 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2005-0256 | 1 Washington University | 1 Wu-ftpd | 2024-02-28 | 5.0 MEDIUM | N/A |
The wu_fnmatch function in wu_fnmatch.c in wu-ftpd 2.6.1 and 2.6.2 allows remote attackers to cause a denial of service (CPU exhaustion by recursion) via a glob pattern with a large number of * (wildcard) characters, as demonstrated using the dir command. | |||||
CVE-2003-1329 | 1 Washington University | 1 Wu-ftpd | 2024-02-28 | 7.8 HIGH | N/A |
ftpd.c in wu-ftpd 2.6.2, when running on "operating systems that only allow one non-connected socket bound to the same local address," does not close failed connections, which allows remote attackers to cause a denial of service. | |||||
CVE-2004-0148 | 2 Sgi, Washington University | 2 Propack, Wu-ftpd | 2024-02-28 | 7.2 HIGH | N/A |
wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead. | |||||
CVE-2003-0854 | 2 Gnu, Washington University | 2 Fileutils, Wu-ftpd | 2024-02-28 | 2.1 LOW | N/A |
ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd. | |||||
CVE-1999-0075 | 1 Washington University | 1 Wu-ftpd | 2024-02-28 | 5.0 MEDIUM | N/A |
PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username and password. | |||||
CVE-2003-1327 | 2 Linux, Washington University | 2 Linux Kernel, Wu-ftpd | 2024-02-28 | 9.3 HIGH | N/A |
Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator. | |||||
CVE-2003-0853 | 2 Gnu, Washington University | 2 Fileutils, Wu-ftpd | 2024-02-28 | 5.0 MEDIUM | N/A |
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd. | |||||
CVE-1999-0955 | 1 Washington University | 1 Wu-ftpd | 2024-02-28 | 7.6 HIGH | N/A |
Race condition in wu-ftpd and BSDI ftpd allows remote attackers to gain root access via the SITE EXEC command. | |||||
CVE-2001-0187 | 1 Washington University | 1 Wu-ftpd | 2024-02-28 | 10.0 HIGH | N/A |
Format string vulnerability in wu-ftp 2.6.1 and earlier, when running with debug mode enabled, allows remote attackers to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment. | |||||
CVE-1999-0080 | 1 Washington University | 1 Wu-ftpd | 2024-02-28 | 10.0 HIGH | N/A |
Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the "site exec" command. | |||||
CVE-2000-0574 | 2 Openbsd, Washington University | 2 Ftpd, Wu-ftpd | 2024-02-28 | 5.0 MEDIUM | N/A |
FTP servers such as OpenBSD ftpd, NetBSD ftpd, ProFTPd and Opieftpd do not properly cleanse untrusted format strings that are used in the setproctitle function (sometimes called by set_proc_title), which allows remote attackers to cause a denial of service or execute arbitrary commands. | |||||
CVE-2004-0185 | 1 Washington University | 1 Wu-ftpd | 2024-02-28 | 10.0 HIGH | N/A |
Buffer overflow in the skey_challenge function in ftpd.c for wu-ftp daemon (wu-ftpd) 2.6.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a s/key (SKEY) request with a long name. | |||||
CVE-1999-0076 | 1 Washington University | 1 Wu-ftpd | 2024-02-28 | 5.0 MEDIUM | N/A |
Buffer overflow in wu-ftp from PASV command causes a core dump. | |||||
CVE-2001-0550 | 2 David Madore, Washington University | 2 Ftpd-bsd, Wu-ftpd | 2024-02-28 | 7.5 HIGH | N/A |
wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" argument to commands such as CWD, which is not properly handled by the glob function (ftpglob). | |||||
CVE-2001-0935 | 1 Washington University | 1 Wu-ftpd | 2024-02-28 | 7.5 HIGH | N/A |
Vulnerability in wu-ftpd 2.6.0, and possibly earlier versions, which is unrelated to the ftpglob bug described in CVE-2001-0550. | |||||
CVE-1999-0081 | 1 Washington University | 1 Wu-ftpd | 2024-02-28 | 5.0 MEDIUM | N/A |
wu-ftp allows files to be overwritten via the rnfr command. | |||||
CVE-1999-0878 | 2 Beroftpd, Washington University | 2 Beroftpd, Wu-ftpd | 2024-02-28 | 10.0 HIGH | N/A |
Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via MAPPING_CHDIR. | |||||
CVE-1999-0156 | 1 Washington University | 1 Wu-ftpd | 2024-02-28 | 4.6 MEDIUM | N/A |
wu-ftpd FTP daemon allows any user and password combination. | |||||
CVE-1999-1326 | 1 Washington University | 1 Wu-ftpd | 2024-02-28 | 5.0 MEDIUM | N/A |
wu-ftpd 2.4 FTP server does not properly drop privileges when an ABOR (abort file transfer) command is executed during a file transfer, which causes a signal to be handled incorrectly and allows local and possibly remote attackers to read arbitrary files. | |||||
CVE-1999-0017 | 9 Caldera, Freebsd, Gnu and 6 more | 11 Openlinux, Freebsd, Inet and 8 more | 2024-02-28 | 7.5 HIGH | N/A |
FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce. |