Search criteria

21 vulnerabilities found for glftpd by glftpd

FKIE_CVE-2021-31645

Vulnerability from fkie_nvd - Published: 2022-07-07 19:15 - Updated: 2024-11-21 06:06
Summary
An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit.
Impacted products
Vendor Product Version
glftpd glftpd 2.11a

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.11a:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B57240-2045-4118-9050-055BBC6E09C7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit."
    },
    {
      "lang": "es",
      "value": "Se ha detectado un problema en glFTPd versi\u00f3n 2.11a, que permite a atacantes remotos causar una denegaci\u00f3n de servicio por medio de la superaci\u00f3n del l\u00edmite de conexi\u00f3n"
    }
  ],
  "id": "CVE-2021-31645",
  "lastModified": "2024-11-21T06:06:04.217",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-07-07T19:15:07.740",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://glftpd.io/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/49773"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://glftpd.io/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/49773"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-1253

Vulnerability from fkie_nvd - Published: 2006-03-19 01:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address.
Impacted products
Vendor Product Version
glftpd glftpd 1.18
glftpd glftpd 1.19
glftpd glftpd 1.20
glftpd glftpd 1.21
glftpd glftpd 1.22
glftpd glftpd 1.23
glftpd glftpd 1.24
glftpd glftpd 1.25
glftpd glftpd 1.26
glftpd glftpd 1.27
glftpd glftpd 1.28
glftpd glftpd 1.29
glftpd glftpd 1.29.1
glftpd glftpd 1.30
glftpd glftpd 1.31
glftpd glftpd 1.32
glftpd glftpd 2.0
glftpd glftpd 2.0_rc1
glftpd glftpd 2.0_rc2
glftpd glftpd 2.0_rc3
glftpd glftpd 2.0_rc4
glftpd glftpd 2.0_rc5
glftpd glftpd 2.0_rc6
glftpd glftpd 2.0_rc7
glftpd glftpd 2.01_rc1
glftpd glftpd 2.01_rc2
glftpd glftpd 2.01_rc3
glftpd glftpd 2.01_rc4

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E50A926-D68F-4B1E-A009-0808611885B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC24C84-A059-4F09-AE7D-1F077AE8F291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8C2E9C-2305-4DAD-8406-D5BFAFBBEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "93D1CB71-B47D-4683-8174-328676D31DC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "91C1CCAA-543B-45EA-ABA1-768CEC9B7B84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1E9A9B-BD3E-4D6B-87F5-1A84ACE32115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "81FD5F55-1937-4063-B534-B04AD0C4DE18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "E99FE53F-F64C-486C-B36F-A987A00F0BFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "648069B8-DCAD-4E41-8721-64ED93CF5D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BC92E29-F4C6-4529-B691-1B3C9621BECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA83D5D1-47A5-4173-9C03-3BBECB446CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "B349E5EE-7190-4CC3-9015-10380DBC281F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.29.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6AE9464-A3D2-4CAE-90F2-E241FEE8D75F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB9FE1C-742B-4EE5-93E1-FF74AF070E0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2CA4FD5-451F-4657-B494-F48DA6D933E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C626C28-742B-4F6D-94E0-56B445260522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F0131D-0E50-433A-ABEB-3B0062BFDC9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "11FFFE55-070E-45B1-889D-0F81EAA1E213",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2931F258-AECE-4181-905A-D8801E12721B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28D773FC-D4D3-495D-BDE0-155B896D1B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0D405B1-8AF9-46A5-AFB0-628F067D8D73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAED5165-E96B-45BD-9C93-A365C6569E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8215195F-1FE1-4F3C-A067-E69F177E58B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B05E032C-B32F-4AD6-B226-9E49CCD5D44F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.01_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "17585572-DF7D-44A6-87EE-2FE7760AEBE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.01_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC5604AF-E077-4195-BF64-1855638C923F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.01_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "43D93E21-AC66-4D9C-9154-4698272F8268",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.01_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D17CAEF-2E71-4D51-8A92-500A3B147242",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address."
    }
  ],
  "id": "CVE-2006-1253",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-03-19T01:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19221"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "URL Repurposed"
      ],
      "url": "http://www.glftpd.com/files/docs/changelog"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/17118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "URL Repurposed"
      ],
      "url": "http://www.glftpd.com/files/docs/changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17118"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-0483

Vulnerability from fkie_nvd - Published: 2005-03-30 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing ("*") characters in a SITE NFO command.
Impacted products
Vendor Product Version
glftpd glftpd 1.26
glftpd glftpd 1.27
glftpd glftpd 1.28
glftpd glftpd 1.29.1
glftpd glftpd 1.31
glftpd glftpd 1.32
glftpd glftpd 2.0
glftpd glftpd 2.0_rc1
glftpd glftpd 2.0_rc2
glftpd glftpd 2.0_rc3
glftpd glftpd 2.0_rc4
glftpd glftpd 2.0_rc5
glftpd glftpd 2.0_rc6
glftpd glftpd 2.0_rc7

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "648069B8-DCAD-4E41-8721-64ED93CF5D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BC92E29-F4C6-4529-B691-1B3C9621BECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA83D5D1-47A5-4173-9C03-3BBECB446CDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.29.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6AE9464-A3D2-4CAE-90F2-E241FEE8D75F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2CA4FD5-451F-4657-B494-F48DA6D933E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C626C28-742B-4F6D-94E0-56B445260522",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F0131D-0E50-433A-ABEB-3B0062BFDC9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "11FFFE55-070E-45B1-889D-0F81EAA1E213",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2931F258-AECE-4181-905A-D8801E12721B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28D773FC-D4D3-495D-BDE0-155B896D1B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0D405B1-8AF9-46A5-AFB0-628F067D8D73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAED5165-E96B-45BD-9C93-A365C6569E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8215195F-1FE1-4F3C-A067-E69F177E58B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B05E032C-B32F-4AD6-B226-9E49CCD5D44F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing (\"*\") characters in a SITE NFO command."
    },
    {
      "lang": "es",
      "value": "M\u00faltiple atravesamiento de directorios en sitenfo.sh,  sitezipchk.sh y siteziplist.sh en Glftpd de la versi\u00f3n 1.26 a la 2.00 permite a usuarios autenticados remotamente:\r\n\r\ndeterminar la existencia de ficheros arbitrarios,\r\nlistar los ficheros incluidos en directorios restringidos,\r\nleer ficheros arbitrarios de archivos ZIP o gzip, mediante; secuencias .. (punto punto) y caracteres (\"\"*\"\") en el comando SITE NFO."
    }
  ],
  "id": "CVE-2005-0483",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-03-30T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/390924"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/12586"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/390924"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/12586"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2001-0965

Vulnerability from fkie_nvd - Published: 2001-08-31 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters.
Impacted products
Vendor Product Version
glftpd glftpd 1.13.6
glftpd glftpd 1.16.9
glftpd glftpd 1.17.2
glftpd glftpd 1.18a
glftpd glftpd 1.19
glftpd glftpd 1.20
glftpd glftpd 1.21
glftpd glftpd 1.22b
glftpd glftpd 1.23

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.13.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F318FEBE-E9EE-4DD2-881C-61E5FE05AAF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.16.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AADA6033-2154-455E-8E10-761E777549E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "06212998-AE09-4DA2-9F9C-EBB60BBD7EBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.18a:*:*:*:*:*:*:*",
              "matchCriteriaId": "834771A5-87B0-41E5-A93C-6A1343726E49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC24C84-A059-4F09-AE7D-1F077AE8F291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8C2E9C-2305-4DAD-8406-D5BFAFBBEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "93D1CB71-B47D-4683-8174-328676D31DC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.22b:*:*:*:*:*:*:*",
              "matchCriteriaId": "431B7EC0-0471-4F31-A26C-F59B541DCD09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE1E9A9B-BD3E-4D6B-87F5-1A84ACE32115",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters."
    }
  ],
  "id": "CVE-2001-0965",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-08-31T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.glftpd.org/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.iss.net/security_center/static/7001.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/3201"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.glftpd.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.iss.net/security_center/static/7001.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/3201"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2000-0587

Vulnerability from fkie_nvd - Published: 2000-06-26 04:00 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E50A926-D68F-4B1E-A009-0808611885B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC24C84-A059-4F09-AE7D-1F077AE8F291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8C2E9C-2305-4DAD-8406-D5BFAFBBEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.21b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF143A96-B3A2-4876-8B50-C583B891752D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.21b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3031BA2A-5FEC-425E-AA1E-DA39FD9CF94E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.21b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A877D2D-854A-4614-931B-BC42E70CEE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.21b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "070A2213-B877-42DE-9112-7A90E13778C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.21b5:*:*:*:*:*:*:*",
              "matchCriteriaId": "53DC7530-D9CC-4E1B-A96D-505CE0005192",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.21b6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DAF880E-B556-465A-8CB8-47196EF0D9B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.21b7:*:*:*:*:*:*:*",
              "matchCriteriaId": "34704098-AD9F-405B-AB35-923546A8B7D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.21b8:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E8DEBD-42E4-4EBF-87BF-7F620584BA9B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability."
    }
  ],
  "id": "CVE-2000-0587",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-06-26T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/1401"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000%40twix.thrijswijk.nl"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/1401"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000%40twix.thrijswijk.nl"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2000-0040

Vulnerability from fkie_nvd - Published: 1999-12-23 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command.
Impacted products
Vendor Product Version
glftpd glftpd 1.17.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:1.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "06212998-AE09-4DA2-9F9C-EBB60BBD7EBB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command."
    }
  ],
  "id": "CVE-2000-0040",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1999-12-23T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2000-0038

Vulnerability from fkie_nvd - Published: 1999-12-23 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
glFtpD includes a default glftpd user account with a default password and a UID of 0.
Impacted products
Vendor Product Version
glftpd glftpd *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:glftpd:glftpd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3E9A6FF-24D4-4900-8112-B18679318534",
              "versionEndIncluding": "1.17.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "glFtpD includes a default glftpd user account with a default password and a UID of 0."
    }
  ],
  "id": "CVE-2000-0038",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1999-12-23T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2021-31645 (GCVE-0-2021-31645)

Vulnerability from cvelistv5 – Published: 2022-07-07 18:42 – Updated: 2024-08-03 23:03
VLAI?
Summary
An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T23:03:33.666Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://glftpd.io/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/49773"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-07T18:42:40",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://glftpd.io/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.exploit-db.com/exploits/49773"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-31645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://glftpd.io/",
              "refsource": "MISC",
              "url": "https://glftpd.io/"
            },
            {
              "name": "https://www.exploit-db.com/exploits/49773",
              "refsource": "MISC",
              "url": "https://www.exploit-db.com/exploits/49773"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-31645",
    "datePublished": "2022-07-07T18:42:40",
    "dateReserved": "2021-04-23T00:00:00",
    "dateUpdated": "2024-08-03T23:03:33.666Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1253 (GCVE-0-2006-1253)

Vulnerability from cvelistv5 – Published: 2006-03-19 01:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/17118 vdb-entryx_refsource_BID
http://secunia.com/advisories/19221 third-party-advisoryx_refsource_SECUNIA
http://www.glftpd.com/files/docs/changelog x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.748Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17118",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17118"
          },
          {
            "name": "19221",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19221"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.glftpd.com/files/docs/changelog"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-03-25T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17118",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17118"
        },
        {
          "name": "19221",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19221"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.glftpd.com/files/docs/changelog"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1253",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17118",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17118"
            },
            {
              "name": "19221",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19221"
            },
            {
              "name": "http://www.glftpd.com/files/docs/changelog",
              "refsource": "CONFIRM",
              "url": "http://www.glftpd.com/files/docs/changelog"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1253",
    "datePublished": "2006-03-19T01:00:00",
    "dateReserved": "2006-03-18T00:00:00",
    "dateUpdated": "2024-08-07T17:03:28.748Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0483 (GCVE-0-2005-0483)

Vulnerability from cvelistv5 – Published: 2005-02-19 05:00 – Updated: 2024-08-07 21:13
VLAI?
Summary
Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing ("*") characters in a SITE NFO command.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:13:54.238Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20050218 Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/390924"
          },
          {
            "name": "glftpd-sitenfosh-directory-traversal(19401)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
          },
          {
            "name": "12586",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12586"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-02-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing (\"*\") characters in a SITE NFO command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20050218 Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/390924"
        },
        {
          "name": "glftpd-sitenfosh-directory-traversal(19401)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
        },
        {
          "name": "12586",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12586"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0483",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing (\"*\") characters in a SITE NFO command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20050218 Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/390924"
            },
            {
              "name": "glftpd-sitenfosh-directory-traversal(19401)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
            },
            {
              "name": "12586",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12586"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0483",
    "datePublished": "2005-02-19T05:00:00",
    "dateReserved": "2005-02-19T00:00:00",
    "dateUpdated": "2024-08-07T21:13:54.238Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-0965 (GCVE-0-2001-0965)

Vulnerability from cvelistv5 – Published: 2002-03-09 05:00 – Updated: 2024-08-08 04:37
VLAI?
Summary
glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:37:07.293Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3201",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/3201"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.glftpd.org/"
          },
          {
            "name": "glftpd-list-dos(7001)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/7001.php"
          },
          {
            "name": "20010817 [ASGUARD-LABS] glFTPD v1.23 DOS Attack",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-08-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-02-28T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "3201",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/3201"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.glftpd.org/"
        },
        {
          "name": "glftpd-list-dos(7001)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/7001.php"
        },
        {
          "name": "20010817 [ASGUARD-LABS] glFTPD v1.23 DOS Attack",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0965",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3201",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/3201"
            },
            {
              "name": "http://www.glftpd.org/",
              "refsource": "CONFIRM",
              "url": "http://www.glftpd.org/"
            },
            {
              "name": "glftpd-list-dos(7001)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/7001.php"
            },
            {
              "name": "20010817 [ASGUARD-LABS] glFTPD v1.23 DOS Attack",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0965",
    "datePublished": "2002-03-09T05:00:00",
    "dateReserved": "2002-01-31T00:00:00",
    "dateUpdated": "2024-08-08T04:37:07.293Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2000-0587 (GCVE-0-2000-0587)

Vulnerability from cvelistv5 – Published: 2000-10-13 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:21:31.318Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1401",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1401"
          },
          {
            "name": "20000626 Glftpd privpath bugs... +fix",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000%40twix.thrijswijk.nl"
          },
          {
            "name": "20000627 Re: Glftpd privpath bugs... +fix",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-06-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1401",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1401"
        },
        {
          "name": "20000626 Glftpd privpath bugs... +fix",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000%40twix.thrijswijk.nl"
        },
        {
          "name": "20000627 Re: Glftpd privpath bugs... +fix",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0587",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1401",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1401"
            },
            {
              "name": "20000626 Glftpd privpath bugs... +fix",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000@twix.thrijswijk.nl"
            },
            {
              "name": "20000627 Re: Glftpd privpath bugs... +fix",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0587",
    "datePublished": "2000-10-13T04:00:00",
    "dateReserved": "2000-07-19T00:00:00",
    "dateUpdated": "2024-08-08T05:21:31.318Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2000-0040 (GCVE-0-2000-0040)

Vulnerability from cvelistv5 – Published: 2000-03-22 05:00 – Updated: 2024-08-08 05:05
VLAI?
Summary
glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:05:52.944Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1999-12-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-17T08:19:53",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0040",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0040",
    "datePublished": "2000-03-22T05:00:00",
    "dateReserved": "2000-01-11T00:00:00",
    "dateUpdated": "2024-08-08T05:05:52.944Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2000-0038 (GCVE-0-2000-0038)

Vulnerability from cvelistv5 – Published: 2000-02-04 05:00 – Updated: 2024-08-08 05:05
VLAI?
Summary
glFtpD includes a default glftpd user account with a default password and a UID of 0.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:05:53.654Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1999-12-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "glFtpD includes a default glftpd user account with a default password and a UID of 0."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-17T08:19:45",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0038",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "glFtpD includes a default glftpd user account with a default password and a UID of 0."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0038",
    "datePublished": "2000-02-04T05:00:00",
    "dateReserved": "2000-01-11T00:00:00",
    "dateUpdated": "2024-08-08T05:05:53.654Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-31645 (GCVE-0-2021-31645)

Vulnerability from nvd – Published: 2022-07-07 18:42 – Updated: 2024-08-03 23:03
VLAI?
Summary
An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T23:03:33.666Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://glftpd.io/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/49773"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-07T18:42:40",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://glftpd.io/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.exploit-db.com/exploits/49773"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-31645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://glftpd.io/",
              "refsource": "MISC",
              "url": "https://glftpd.io/"
            },
            {
              "name": "https://www.exploit-db.com/exploits/49773",
              "refsource": "MISC",
              "url": "https://www.exploit-db.com/exploits/49773"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-31645",
    "datePublished": "2022-07-07T18:42:40",
    "dateReserved": "2021-04-23T00:00:00",
    "dateUpdated": "2024-08-03T23:03:33.666Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1253 (GCVE-0-2006-1253)

Vulnerability from nvd – Published: 2006-03-19 01:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/17118 vdb-entryx_refsource_BID
http://secunia.com/advisories/19221 third-party-advisoryx_refsource_SECUNIA
http://www.glftpd.com/files/docs/changelog x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.748Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17118",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17118"
          },
          {
            "name": "19221",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19221"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.glftpd.com/files/docs/changelog"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-03-25T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17118",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17118"
        },
        {
          "name": "19221",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19221"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.glftpd.com/files/docs/changelog"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1253",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17118",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17118"
            },
            {
              "name": "19221",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19221"
            },
            {
              "name": "http://www.glftpd.com/files/docs/changelog",
              "refsource": "CONFIRM",
              "url": "http://www.glftpd.com/files/docs/changelog"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1253",
    "datePublished": "2006-03-19T01:00:00",
    "dateReserved": "2006-03-18T00:00:00",
    "dateUpdated": "2024-08-07T17:03:28.748Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0483 (GCVE-0-2005-0483)

Vulnerability from nvd – Published: 2005-02-19 05:00 – Updated: 2024-08-07 21:13
VLAI?
Summary
Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing ("*") characters in a SITE NFO command.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:13:54.238Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20050218 Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/390924"
          },
          {
            "name": "glftpd-sitenfosh-directory-traversal(19401)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
          },
          {
            "name": "12586",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12586"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-02-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing (\"*\") characters in a SITE NFO command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20050218 Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/390924"
        },
        {
          "name": "glftpd-sitenfosh-directory-traversal(19401)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
        },
        {
          "name": "12586",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12586"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0483",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing (\"*\") characters in a SITE NFO command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20050218 Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/390924"
            },
            {
              "name": "glftpd-sitenfosh-directory-traversal(19401)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
            },
            {
              "name": "12586",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12586"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0483",
    "datePublished": "2005-02-19T05:00:00",
    "dateReserved": "2005-02-19T00:00:00",
    "dateUpdated": "2024-08-07T21:13:54.238Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-0965 (GCVE-0-2001-0965)

Vulnerability from nvd – Published: 2002-03-09 05:00 – Updated: 2024-08-08 04:37
VLAI?
Summary
glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:37:07.293Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3201",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/3201"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.glftpd.org/"
          },
          {
            "name": "glftpd-list-dos(7001)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/7001.php"
          },
          {
            "name": "20010817 [ASGUARD-LABS] glFTPD v1.23 DOS Attack",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-08-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-02-28T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "3201",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/3201"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.glftpd.org/"
        },
        {
          "name": "glftpd-list-dos(7001)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/7001.php"
        },
        {
          "name": "20010817 [ASGUARD-LABS] glFTPD v1.23 DOS Attack",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0965",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3201",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/3201"
            },
            {
              "name": "http://www.glftpd.org/",
              "refsource": "CONFIRM",
              "url": "http://www.glftpd.org/"
            },
            {
              "name": "glftpd-list-dos(7001)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/7001.php"
            },
            {
              "name": "20010817 [ASGUARD-LABS] glFTPD v1.23 DOS Attack",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0965",
    "datePublished": "2002-03-09T05:00:00",
    "dateReserved": "2002-01-31T00:00:00",
    "dateUpdated": "2024-08-08T04:37:07.293Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2000-0587 (GCVE-0-2000-0587)

Vulnerability from nvd – Published: 2000-10-13 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:21:31.318Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1401",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1401"
          },
          {
            "name": "20000626 Glftpd privpath bugs... +fix",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000%40twix.thrijswijk.nl"
          },
          {
            "name": "20000627 Re: Glftpd privpath bugs... +fix",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-06-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1401",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1401"
        },
        {
          "name": "20000626 Glftpd privpath bugs... +fix",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000%40twix.thrijswijk.nl"
        },
        {
          "name": "20000627 Re: Glftpd privpath bugs... +fix",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0587",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1401",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1401"
            },
            {
              "name": "20000626 Glftpd privpath bugs... +fix",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000@twix.thrijswijk.nl"
            },
            {
              "name": "20000627 Re: Glftpd privpath bugs... +fix",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0587",
    "datePublished": "2000-10-13T04:00:00",
    "dateReserved": "2000-07-19T00:00:00",
    "dateUpdated": "2024-08-08T05:21:31.318Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2000-0040 (GCVE-0-2000-0040)

Vulnerability from nvd – Published: 2000-03-22 05:00 – Updated: 2024-08-08 05:05
VLAI?
Summary
glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:05:52.944Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1999-12-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-17T08:19:53",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0040",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0040",
    "datePublished": "2000-03-22T05:00:00",
    "dateReserved": "2000-01-11T00:00:00",
    "dateUpdated": "2024-08-08T05:05:52.944Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2000-0038 (GCVE-0-2000-0038)

Vulnerability from nvd – Published: 2000-02-04 05:00 – Updated: 2024-08-08 05:05
VLAI?
Summary
glFtpD includes a default glftpd user account with a default password and a UID of 0.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:05:53.654Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1999-12-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "glFtpD includes a default glftpd user account with a default password and a UID of 0."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-17T08:19:45",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0038",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "glFtpD includes a default glftpd user account with a default password and a UID of 0."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0038",
    "datePublished": "2000-02-04T05:00:00",
    "dateReserved": "2000-01-11T00:00:00",
    "dateUpdated": "2024-08-08T05:05:53.654Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}