CVE-2001-0644

Maxum Rumpus FTP Server 1.3.3 and 2.0.3 dev 3 stores passwords in plaintext in the "Rumpus User Database" file in the prefs folder, which could allow attackers to gain privileges on the server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:maxum_development_corporation:rumpus_ftp_server:*:*:*:*:*:*:*:*
cpe:2.3:a:maxum_development_corporation:rumpus_ftp_server:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:maxum_development_corporation:rumpus_ftp_server:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:maxum_development_corporation:rumpus_ftp_server:1.3.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:35

Type Values Removed Values Added
References () http://www.securityfocus.com/archive/1/184751 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/archive/1/184751 - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/2718 - Vendor Advisory () http://www.securityfocus.com/bid/2718 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6543 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6543 -

Information

Published : 2001-09-20 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2001-0644

Mitre link : CVE-2001-0644

CVE.ORG link : CVE-2001-0644


JSON object : View

Products Affected

maxum_development_corporation

  • rumpus_ftp_server