Vulnerabilities > Washington University > WU Ftpd > 2.4.2.beta18.vr15

DATE CVE VULNERABILITY TITLE RISK
2004-04-15 CVE-2004-0148 wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.
local
low complexity
sgi washington-university
7.2
2003-11-17 CVE-2003-0854 ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.
local
low complexity
gnu washington-university
2.1
2003-11-17 CVE-2003-0853 Integer Overflow vulnerability in Coreutils LS Width Argument
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.
network
low complexity
gnu washington-university
5.0
2001-03-26 CVE-2001-0187 Unspecified vulnerability in Washington University Wu-Ftpd
Format string vulnerability in wu-ftp 2.6.1 and earlier, when running with debug mode enabled, allows remote attackers to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment.
network
low complexity
washington-university
critical
10.0
2000-07-07 CVE-2000-0574 FTP servers such as OpenBSD ftpd, NetBSD ftpd, ProFTPd and Opieftpd do not properly cleanse untrusted format strings that are used in the setproctitle function (sometimes called by set_proc_title), which allows remote attackers to cause a denial of service or execute arbitrary commands.
network
low complexity
openbsd washington-university
5.0
1999-08-22 CVE-1999-0878 Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via MAPPING_CHDIR.
network
low complexity
beroftpd washington-university
critical
10.0