Vulnerabilities > Washington University
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-08-22 | CVE-1999-0878 | Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via MAPPING_CHDIR. | 10.0 |
1999-02-09 | CVE-1999-0368 | Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. network low complexity washington-university proftpd-project sco slackware redhat debian caldera critical | 10.0 |
1997-12-10 | CVE-1999-0017 | FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce. | 7.5 |
1997-09-23 | CVE-1999-0955 | Unspecified vulnerability in Washington University Wu-Ftpd 2.4.1 Race condition in wu-ftpd and BSDI ftpd allows remote attackers to gain root access via the SITE EXEC command. | 7.6 |
1997-07-04 | CVE-1999-1326 | Unspecified vulnerability in Washington University Wu-Ftpd 2.4 wu-ftpd 2.4 FTP server does not properly drop privileges when an ABOR (abort file transfer) command is executed during a file transfer, which causes a signal to be handled incorrectly and allows local and possibly remote attackers to read arbitrary files. | 5.0 |
1997-07-01 | CVE-1999-0156 | Unspecified vulnerability in Washington University Wu-Ftpd wu-ftpd FTP daemon allows any user and password combination. | 4.6 |
1997-07-01 | CVE-1999-0076 | Unspecified vulnerability in Washington University Wu-Ftpd Buffer overflow in wu-ftp from PASV command causes a core dump. | 5.0 |
1997-01-11 | CVE-1999-0081 | Unspecified vulnerability in Washington University Wu-Ftpd wu-ftp allows files to be overwritten via the rnfr command. | 5.0 |
1996-10-16 | CVE-1999-0075 | Unspecified vulnerability in Washington University Wu-Ftpd PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username and password. | 5.0 |
1995-11-30 | CVE-1999-0080 | Unspecified vulnerability in Washington University Wu-Ftpd 2.4 Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the "site exec" command. | 10.0 |