Total vulnerabilities in the database
Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file.
Software | From | Fixed in |
---|---|---|
ipswitch / ws_ftp_server | 4.01 | 4.01.x |
ipswitch / ws_ftp_server | 3.0_1 | 3.0_1.x |
progress / ws_ftp_server | 1.0.1 | 1.0.1.x |
progress / ws_ftp_server | 1.0.2 | 1.0.2.x |
progress / ws_ftp_server | 1.0.3 | 1.0.3.x |
progress / ws_ftp_server | 1.0.4 | 1.0.4.x |
progress / ws_ftp_server | 1.0.5 | 1.0.5.x |
progress / ws_ftp_server | 2.0 | 2.0.x |
progress / ws_ftp_server | 2.0.1 | 2.0.1.x |
progress / ws_ftp_server | 2.0.2 | 2.0.2.x |
progress / ws_ftp_server | 2.0.3 | 2.0.3.x |
progress / ws_ftp_server | 2.0.4 | 2.0.4.x |
progress / ws_ftp_server | 3.0 | 3.0.x |
progress / ws_ftp_server | 3.1 | 3.1.x |
progress / ws_ftp_server | 3.1.1 | 3.1.1.x |
progress / ws_ftp_server | 3.1.2 | 3.1.2.x |
progress / ws_ftp_server | 3.1.3 | 3.1.3.x |
progress / ws_ftp_server | 3.4 | 3.4.x |
progress / ws_ftp_server | 4.0 | 4.0.x |
progress / ws_ftp_server | 4.0.2 | 4.0.2.x |