Ws Ftp Server Ipswitch Ws Ftp Server

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Ipswitch Ws Ftp Server.

By the Year

In 2026 there have been 0 vulnerabilities in Ipswitch Ws Ftp Server. Ws Ftp Server did not have any published security vulnerabilities last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 4 6.90
2023 6 7.90
2022 1 6.10
2021 0 0.00
2020 0 0.00
2019 3 8.80

It may take a day or so for new Ws Ftp Server vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Ipswitch Ws Ftp Server Security Vulnerabilities

Auth Bypass in WS_FTP Server <8.8.9 via Web Transfer Module
CVE-2024-9999 - November 12, 2024

In WS_FTP Server versions before 8.8.9 (2022.0.9), an Incorrect Implementation of Authentication Algorithm in the Web Transfer Module allows users to skip the second-factor verification and log in with username and password only.

Incorrect Implementation of Authentication Algorithm

WS_FTP Server <8.8.8: Web Transfer Path Traversal Allows Arbitrary File Download
CVE-2024-7744 6.5 - Medium - August 28, 2024

In WS_FTP Server versions before 8.8.8 (2022.0.8), an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Web Transfer Module allows File Discovery, Probe System Files, User-Controlled Filename, Path Traversal.   An authenticated file download flaw has been identified where a user can craft an API call that allows them to download a file from an arbitrary folder on the drive where that user host's root folder is located (by default this is C:)

Directory traversal

WS_FTP Server <=8.8.7 MFA Bypass in Web Transfer
CVE-2024-7745 8.1 - High - August 28, 2024

In WS_FTP Server versions before 8.8.8 (2022.0.8), a Missing Critical Step in Multi-Factor Authentication of the Web Transfer Module allows users to skip the second-factor verification and log in with username and password only.

authentification

WS_FTP Server vulnerable to reflected XSS in admin interface before 8.8.5
CVE-2024-1474 6.1 - Medium - February 21, 2024

In WS_FTP Server versions before 8.8.5, reflected cross-site scripting issues have been identified on various user supplied inputs on the WS_FTP Server administrative interface.

XSS

Unrestricted File Upload in WS_FTP Server <8.7.6/8.8.4
CVE-2023-42659 8.8 - High - November 07, 2023

In WS_FTP Server versions prior to 8.7.6 and 8.8.4, an unrestricted file upload flaw has been identified. An authenticated Ad Hoc Transfer user has the ability to craft an API call which allows them to upload a file to a specified location on the underlying operating system hosting the WS_FTP Server application.

Unrestricted File Upload

WS_FTP Server POST CSRF vulnerability pre-8.8.2
CVE-2023-40048 6.5 - Medium - September 27, 2023

In WS_FTP Server version prior to 8.8.2, the WS_FTP Server Manager interface was missing cross-site request forgery (CSRF) protection on a POST transaction corresponding to a WS_FTP Server administrative function.

Session Riding

WS_FTP Server <8.8.2 Directory Enumeration via WebServiceHost
CVE-2023-40049 5.3 - Medium - September 27, 2023

In WS_FTP Server version prior to 8.8.2, an unauthenticated user could enumerate files under the 'WebServiceHost' directory listing.

WS_FTP Server <8.7.4 or <8.8.2: Directory Traversal Allowing File Ops
CVE-2023-42657 9.6 - Critical - September 27, 2023

In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a directory traversal vulnerability was discovered.  An attacker could leverage this vulnerability to perform file operations (delete, rename, rmdir, mkdir) on files and folders outside of their authorized WS_FTP folder path.  Attackers could also escape the context of the WS_FTP Server file structure and perform the same level of operations (delete, rename, rmdir, mkdir) on file and folder locations on the underlying operating system.

Directory traversal

WS_FTP Server <8.7.4/8.8.2 .NET Deserialization Enables Remote Cmd Exec
CVE-2023-40044 10 - Critical - September 27, 2023

In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.

Marshaling, Unmarshaling

SQLi in WS_FTP Server Manager pre 8.7.4 & 8.8.2
CVE-2023-40046 7.2 - High - September 27, 2023

In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a SQL injection vulnerability exists in the WS_FTP Server manager interface. An attacker may be able to infer information about the structure and contents of the database and execute SQL statements that alter or delete database elements.

SQL Injection

WS_FTP Server <8.7.3: Reflected XSS in Admin Web Interface
CVE-2022-36967 6.1 - Medium - August 02, 2022

In Progress WS_FTP Server prior to version 8.7.3, multiple reflected cross-site scripting (XSS) vulnerabilities exist in the administrative web interface. It is possible for a remote attacker to inject arbitrary JavaScript into a WS_FTP administrator's web session. This would allow the attacker to execute code within the context of the victim's browser.

XSS

A Directory Traversal issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1
CVE-2019-12146 9.1 - Critical - June 11, 2019

A Directory Traversal issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1. Attackers have the ability to abuse a flaw in the SCP listener by crafting strings using specific patterns to write files and create directories outside of their authorized directory.

Directory traversal

A Directory Traversal issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1
CVE-2019-12145 7.5 - High - June 11, 2019

A Directory Traversal issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1. An attacker can supply a string using special patterns via the SCP protocol to disclose path names on the host operating system.

Directory traversal

An issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1
CVE-2019-12144 9.8 - Critical - June 11, 2019

An issue was discovered in SSHServerAPI.dll in Progress ipswitch WS_FTP Server 2018 before 8.6.1. Attackers have the ability to abuse a path traversal vulnerability using the SCP protocol. Attackers who leverage this flaw could also obtain remote code execution by crafting a payload that abuses the SITE command feature.

Directory traversal

Unspecified vulnerability in the log analyzer in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, prevents certain sensitive information
CVE-2006-5001 - September 26, 2006

Unspecified vulnerability in the log analyzer in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, prevents certain sensitive information from being displayed in the (1) Files and (2) Summary tabs. NOTE: in the early publication of this identifier on 20060926, the description was used for the wrong issue.

Multiple buffer overflows in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, have unknown impact and remote authenticated attack vectors
CVE-2006-5000 - September 26, 2006

Multiple buffer overflows in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, have unknown impact and remote authenticated attack vectors via the (1) XCRC, (2) XMD5, and (3) XSHA1 commands. NOTE: in the early publication of this identifier on 20060926, the description was used for the wrong issue.

Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1
CVE-2006-4847 - September 19, 2006

Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands.

Ipswitch WS_FTP Server 4.0.2
CVE-2004-1848 - December 31, 2004

Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file.

Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which
CVE-2004-1884 - March 23, 2004

Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access.

Multiple buffer overflows in WS_FTP 3 and 4
CVE-2003-0772 - September 22, 2003

Multiple buffer overflows in WS_FTP 3 and 4 allow remote authenticated users to cause a denial of service and possibly execute arbitrary code via long (1) APPE (append) or (2) STAT (status) arguments.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Ipswitch Ws Ftp Server or by Ipswitch? Click the Watch button to subscribe.

Ipswitch
Vendor

subscribe