Stack-based buffer overflow in index.fts in FTGate Technology (formerly known as Floosietek) FTGate 4.4 (aka Build 4.4.000 Oct 26 2005) allows remote attackers to execute arbitrary code via a long tzoffset value.
Max CVSS
7.5
EPSS Score
1.65%
Published
2005-12-29
Updated
2011-03-08
Multiple format string vulnerabilities in FTGate Technology (formerly known as Floosietek) FTGate 4.4 (aka Build 4.4.000 Oct 26 2005) allow remote attackers to execute arbitrary code via format string specifiers in the (1) USER, (2) PASS, and (3) TOP commands to the POP3 server; and the (4) LIST and (5) AUTHENTICATE commands to the IMAP server.
Max CVSS
7.5
EPSS Score
1.85%
Published
2005-12-29
Updated
2011-03-08
Multiple cross-site scripting (XSS) vulnerabilities in FTGate Technology (formerly known as Floosietek) FTGate 4.4 (Build 4.4.000 Oct 26 2005) allow remote attackers to inject arbitrary web script or HTML by sending (1) the href parameter to index.fts, or the param1 parameter to (2) /domains/index.fts, (3) /config/licence.fts, or (4) /config/systemacl.fts.
Max CVSS
5.8
EPSS Score
1.56%
Published
2005-12-29
Updated
2011-03-08
Multiple buffer overflows in the IMAP Groupware Mail server of Floosietek FTGate (FTGate4) 4.1 allow remote attackers to execute arbitrary code via long arguments to various IMAP commands, as demonstrated with the EXAMINE command.
Max CVSS
10.0
EPSS Score
23.84%
Published
2005-11-16
Updated
2017-07-11
The POP3 server in FTGate returns an -ERR code after receiving an invalid USER request, which makes it easier for remote attackers to determine valid usernames and conduct brute force password guessing.
Max CVSS
5.0
EPSS Score
0.19%
Published
2000-12-31
Updated
2008-09-05
FTGate web interface server allows remote attackers to read files via a .. (dot dot) attack.
Max CVSS
5.0
EPSS Score
1.90%
Published
1999-11-04
Updated
2008-09-09
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!