WFTPD version 3.25 leaves credentials accessible in wftpd.ini.
84b7e59e7c79b2e7f54fe4511e8ee6e1626462eecb05c8c986d66ac424e88a4a
Novell Netware version 6.5 SP8 suffers from a NWFTPD.NLM DELE remote code execution vulnerability. Proof of concept code is included.
e6b5b9754b88906fa5415e298f3ba6595aaf3cdb4b2fdf89f8dcf1a68b8e91be
Zero Day Initiative Advisory 11-106 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Netware. Authentication is required to exploit this vulnerability. The flaw exists within NWFTPD.NLM. When handling the argument provided to the DELE command the application copies user supplied data to a fixed length stack buffer. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the super user.
4a790c4123f37079211c02acda9f0abd778b9936eeb84b5f19624b30e8a2976e
Month Of Abysssec Undisclosed Bugs - Novell Netware NWFTPD suffers from a RMD/RNFR/DELE argument parsing buffer overflow.
c81669f9a0dab88339bc13b0f5395505b6284452be79e0f17e5cb416a3709456
Month Of Abysssec Undisclosed Bugs - Novell Netware NWFTPD suffers from a RMD/RNFR/DELE argument parsing buffer overflow.
a54ce7c53b97508938cdfba5be3024fb391acc0b3ad3f07b240c9903e0fab1b9
WFTPD Server version 3.30 directory traversal exploit.
2e2fb1913a585ae5cf5f8fb18da7901f4b134cb92fceedd7436ccec16353d38f
Zero Day Initiative Advisory 10-062 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Netware NWFTPD daemon. Authentication or default anonymous access is required to exploit this vulnerability. The specific flaw exists when parsing malformed arguments to the verbs RMD, RNFR, and DELE. Overly long parameters will result in stack based buffer overflows which can be leveraged to execute arbitrary code.
e59f68c70121d5b87667d3e62743a14f2285d8f9cf7c071feffc338e66a0eed7
WFTPD version 3.3 remote unhandled exception denial of service exploit.
a2d0bc4b9fd783e5d528072b32ee00867bd6a96116ad439abba46b44a34ce958
Secunia Security Advisory - A vulnerability has been discovered in WFTPD Server and WFTPD Pro Server, which can be exploited by malicious users to cause a DoS (Denial of Service).
d90c70998c4ab1db77a928e40a1bd2881748e0600bc6aa439f554411dca5bcf5
This Metasploit module exploits a buffer overflow in the SIZE verb in Texas Imperial's Software WFTPD 3.23.
f255f4f4f27037979984d233d5181284b704a052d7b54c7637a611696f60e841
WFTPD Explorer Pro version 1.0 remote heap overflow exploit that spawns calc.exe.
010a0b8b7f9edfb819701abd6dd9bfe4f94c0ed71d131ae44edf94631623aed9
WFTPD Pro Server version 3.30.0.1 pre-authentication remote denial of service exploit.
5638b47d2422ffe039bc9c4b65d9438c7d7fd1ea65c1167ed5cc31ba827265f2
Secunia Security Advisory - r4x has reported a vulnerability in WFTPD Explorer, which potentially can be exploited by malicious people to compromise a user's system.
2ea7ccb80c6715cf5af53f54efdc3fc5f1b7728b18785e8733aed5a27036f62f
WFTPD Explorer Pro version 1.0 proof of concept remote heap overflow exploit.
387d7811f53450d3dd27624bbd58b40b150526f54534c793e8b8f4f85a22cfac
A buffer overflow with possible remote code execution was found in the APPE command in WFTPD Pro Server 3.23.
e4b4062f5ad90277ec1a6b2d1f2baeefcee5740cc88394073e839fee3c4d61e3
WFTPD Pro Server 3.23.1.1 Buffer Overflow DoS exploit.
bfbf22cd46872e87711eb954baa7a523f59a932329b8cfc3c2888f8406eeabb3
WFTPD server version 3.23 (SIZE) remote buffer overflow exploit.
7914ac75638a3567f909d4690b5f4cdaefdeaf62139121344bbc3778b0a2c588
Windows FTP server unicode buffer overflow.
5a5f9c6f43eb5ff0bc65caa154260e8179fea3c69dfb2478d00272f4613e438c
Windows FTP Server remote DoS exploit.
09f7d64247dd629ee0c3ef325046fa7070e1dca518a3fe1d8522fe57b31418f1
Denial of service exploit for WFTPD Pro Server 3.21.
1b425d9c92c35788e475a0c9cee6eff3913a26fe40755dce3d937b232c646905
WFTPD Pro Server 3.21 is susceptible to a denial of service attack via the mlst command.
d70fdbca97c076bf1ebef585daf3ae4a97b3250703dfcbb43d46a646bbe43dfd
Remote exploit for WFTPD server. Tested against WFTPD Pro server version 3.21.1.1 on Windows 2000 CN SP4.
36efa8521fe6d42fba082e0c14015fe3be98a3a0ad14ca3a9df03000a85bc69b
Exploit for WFTPD server versions 3.1 through 3.21 and Pro server versions 3.2x that makes use of a stack based buffer overflow.
a57bebe6f1b27bc7da42783916b3a84a28681d61b69b68dca9abdbcc05f6ff60
WFTPD server versions 3.1 through 3.21 and Pro server versions 3.2x have a stack based buffer overflow vulnerability that a remote attacker can exploit to execute arbitrary code. The daemon runs with SYSTEM privileges under Pro server releases and it runs under the user ID that spawn the process under regular server releases.
d96604be4ee3e2c5998b797791156e6d9f79c002f026168f787de6bf9ca7720b
WFTPD Pro Server 3.21 Release 1 allows a remote attacker to allocate arbitrary amounts of memory and force the WFTPD server process to use 100% of the CPU. Another DoS vulnerability allows an attacker to send a special string to crash WFTPD.
d887c0440b1d41aba0cf8a76e0f99a37d5551ed4797090d630c62c2422de5181
Cqure.net Security Advisory 20020408.netware_nwftpd.a - A vulnerability found in the Novell Netware 6.0 SP1 FTP daemon can be used in a denial of service against this application. Exploitation of this problem can result that the daemon starts consuming all CPU resources.
090c17bdcfa438d7edb5199d6b979d712c815b29b6cfad263682923334c7e20b