Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Washington University Subscribe
Total 22 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-1999-0156 1 Washington University 1 Wu-ftpd 2022-08-17 4.6 MEDIUM N/A
wu-ftpd FTP daemon allows any user and password combination.
CVE-1999-0955 1 Washington University 1 Wu-ftpd 2022-08-17 7.6 HIGH N/A
Race condition in wu-ftpd and BSDI ftpd allows remote attackers to gain root access via the SITE EXEC command.
CVE-1999-0368 7 Caldera, Debian, Proftpd Project and 4 more 8 Openlinux, Debian Linux, Proftpd and 5 more 2022-08-17 10.0 HIGH N/A
Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
CVE-1999-0017 9 Caldera, Freebsd, Gnu and 6 more 11 Openlinux, Freebsd, Inet and 8 more 2022-08-17 7.5 HIGH N/A
FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce.
CVE-1999-0076 1 Washington University 1 Wu-ftpd 2022-08-17 5.0 MEDIUM N/A
Buffer overflow in wu-ftp from PASV command causes a core dump.
CVE-1999-0080 1 Washington University 1 Wu-ftpd 2022-08-16 10.0 HIGH N/A
Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the "site exec" command.
CVE-1999-0081 1 Washington University 1 Wu-ftpd 2022-08-16 5.0 MEDIUM N/A
wu-ftp allows files to be overwritten via the rnfr command.
CVE-2001-0550 2 David Madore, Washington University 2 Ftpd-bsd, Wu-ftpd 2018-05-02 7.5 HIGH N/A
wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" argument to commands such as CWD, which is not properly handled by the glob function (ftpglob).
CVE-2004-0148 2 Sgi, Washington University 2 Propack, Wu-ftpd 2018-05-02 7.2 HIGH N/A
wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.
CVE-2003-0466 7 Apple, Freebsd, Netbsd and 4 more 8 Mac Os X, Mac Os X Server, Freebsd and 5 more 2018-05-02 10.0 HIGH N/A
Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO.
CVE-2003-0854 2 Gnu, Washington University 2 Fileutils, Wu-ftpd 2017-10-10 2.1 LOW N/A
ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.
CVE-2005-0256 1 Washington University 1 Wu-ftpd 2017-10-10 5.0 MEDIUM N/A
The wu_fnmatch function in wu_fnmatch.c in wu-ftpd 2.6.1 and 2.6.2 allows remote attackers to cause a denial of service (CPU exhaustion by recursion) via a glob pattern with a large number of * (wildcard) characters, as demonstrated using the dir command.
CVE-2004-0185 1 Washington University 1 Wu-ftpd 2017-10-09 10.0 HIGH N/A
Buffer overflow in the skey_challenge function in ftpd.c for wu-ftp daemon (wu-ftpd) 2.6.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a s/key (SKEY) request with a long name.
CVE-2001-0187 1 Washington University 1 Wu-ftpd 2017-10-09 10.0 HIGH N/A
Format string vulnerability in wu-ftp 2.6.1 and earlier, when running with debug mode enabled, allows remote attackers to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment.
CVE-1999-1326 1 Washington University 1 Wu-ftpd 2017-10-09 5.0 MEDIUM N/A
wu-ftpd 2.4 FTP server does not properly drop privileges when an ABOR (abort file transfer) command is executed during a file transfer, which causes a signal to be handled incorrectly and allows local and possibly remote attackers to read arbitrary files.
CVE-2003-1327 2 Linux, Washington University 2 Linux Kernel, Wu-ftpd 2017-07-28 9.3 HIGH N/A
Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.
CVE-2003-0853 2 Gnu, Washington University 2 Fileutils, Wu-ftpd 2008-09-10 5.0 MEDIUM N/A
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.
CVE-2001-0935 1 Washington University 1 Wu-ftpd 2008-09-10 7.5 HIGH N/A
Vulnerability in wu-ftpd 2.6.0, and possibly earlier versions, which is unrelated to the ftpglob bug described in CVE-2001-0550.
CVE-2000-0574 2 Openbsd, Washington University 2 Ftpd, Wu-ftpd 2008-09-10 5.0 MEDIUM N/A
FTP servers such as OpenBSD ftpd, NetBSD ftpd, ProFTPd and Opieftpd do not properly cleanse untrusted format strings that are used in the setproctitle function (sometimes called by set_proc_title), which allows remote attackers to cause a denial of service or execute arbitrary commands.
CVE-1999-0878 2 Beroftpd, Washington University 2 Beroftpd, Wu-ftpd 2008-09-09 10.0 HIGH N/A
Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via MAPPING_CHDIR.