Glftpd : Security Vulnerabilities
An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit.
Max Base Score
7.5
Published
2022-07-07
Updated
2022-07-14
EPSS
1.67%
Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address.
Max Base Score
7.5
Published
2006-03-19
Updated
2008-09-05
EPSS
1.29%
Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing ("*") characters in a SITE NFO command.
Max Base Score
5.0
Published
2005-03-30
Updated
2017-07-11
EPSS
0.81%
glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters.
Max Base Score
5.0
Published
2001-08-31
Updated
2008-09-05
EPSS
1.16%
The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability.
Max Base Score
10.0
Published
2000-06-26
Updated
2008-09-10
EPSS
0.87%
glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command.
Max Base Score
10.0
Published
1999-12-23
Updated
2022-08-17
EPSS
6.27%
glFtpD includes a default glftpd user account with a default password and a UID of 0.
Max Base Score
7.5
Published
1999-12-23
Updated
2022-08-17
EPSS
2.68%
7 vulnerabilities found