An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit.
Max CVSS
7.5
EPSS Score
2.23%
Published
2022-07-07
Updated
2022-07-14
Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address.
Max CVSS
7.5
EPSS Score
1.23%
Published
2006-03-19
Updated
2008-09-05
Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing ("*") characters in a SITE NFO command.
Max CVSS
5.0
EPSS Score
0.81%
Published
2005-03-30
Updated
2017-07-11
glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters.
Max CVSS
5.0
EPSS Score
1.16%
Published
2001-08-31
Updated
2008-09-05
The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability.
Max CVSS
10.0
EPSS Score
0.84%
Published
2000-06-26
Updated
2008-09-10
glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command.
Max CVSS
10.0
EPSS Score
1.50%
Published
1999-12-23
Updated
2022-08-17
glFtpD includes a default glftpd user account with a default password and a UID of 0.
Max CVSS
7.5
EPSS Score
1.42%
Published
1999-12-23
Updated
2022-08-17
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!