Show filters
22 Total Results
Displaying 11-20 of 22
Sort by:
Attacker Value
Unknown
CVE-2005-2533
Disclosure Date: August 24, 2005 (last updated February 22, 2025)
OpenVPN before 2.0.1, when running in "dev tap" Ethernet bridging mode, allows remote authenticated clients to cause a denial of service (memory exhaustion) via a flood of packets with a large number of spoofed MAC addresses.
0
Attacker Value
Unknown
CVE-2005-2534
Disclosure Date: August 24, 2005 (last updated February 22, 2025)
Race condition in OpenVPN before 2.0.1, when --duplicate-cn is not enabled, allows remote attackers to cause a denial of service (server crash) via simultaneous TCP connections from multiple clients that use the same client certificate.
0
Attacker Value
Unknown
CVE-2005-2532
Disclosure Date: August 24, 2005 (last updated February 22, 2025)
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue when a packet can not be decrypted by the server, which allows remote authenticated attackers to cause a denial of service (client disconnection) via a large number of packets that can not be decrypted.
0
Attacker Value
Unknown
CVE-2005-2531
Disclosure Date: August 24, 2005 (last updated February 22, 2025)
OpenVPN before 2.0.1, when running with "verb 0" and without TLS authentication, does not properly flush the OpenSSL error queue when a client fails certificate authentication to the server and causes the error to be processed by the wrong client, which allows remote attackers to cause a denial of service (client disconnection) via a large number of failed authentication attempts.
0
Attacker Value
Unknown
CVE-2004-0148
Disclosure Date: April 15, 2004 (last updated February 22, 2025)
wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.
0
Attacker Value
Unknown
CVE-2003-0854
Disclosure Date: November 17, 2003 (last updated February 22, 2025)
ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.
0
Attacker Value
Unknown
CVE-2003-0853
Disclosure Date: November 17, 2003 (last updated February 22, 2025)
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.
0
Attacker Value
Unknown
CVE-2001-0187
Disclosure Date: March 26, 2001 (last updated February 22, 2025)
Format string vulnerability in wu-ftp 2.6.1 and earlier, when running with debug mode enabled, allows remote attackers to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment.
0
Attacker Value
Unknown
CVE-2000-0574
Disclosure Date: July 07, 2000 (last updated February 22, 2025)
FTP servers such as OpenBSD ftpd, NetBSD ftpd, ProFTPd and Opieftpd do not properly cleanse untrusted format strings that are used in the setproctitle function (sometimes called by set_proc_title), which allows remote attackers to cause a denial of service or execute arbitrary commands.
0
Attacker Value
Unknown
CVE-2000-0096
Disclosure Date: January 26, 2000 (last updated February 22, 2025)
Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command.
0