CVE-2004-1884
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
23/03/2004
Last modified:
03/04/2025
Description
Ipswitch WS_FTP Server 4.0.2 has a backdoor XXSESS_MGRYY username with a default password, which allows remote attackers to gain access.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ipswitch:ws_ftp_pro:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:ws_ftp_pro:7.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:ws_ftp_pro:8.0_2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:ws_ftp_pro:8.0_3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:ws_ftp_server:3.0_1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ipswitch:ws_ftp_server:4.01:*:*:*:*:*:*:* | ||
| cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=bugtraq&m=108006581418116&w=2
- http://secunia.com/advisories/11206
- http://www.securityfocus.com/bid/9953
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15558
- http://marc.info/?l=bugtraq&m=108006581418116&w=2
- http://secunia.com/advisories/11206
- http://www.securityfocus.com/bid/9953
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15558



