Search criteria
21 vulnerabilities found for glftpd by glftpd
FKIE_CVE-2021-31645
Vulnerability from fkie_nvd - Published: 2022-07-07 19:15 - Updated: 2024-11-21 06:06
Severity ?
Summary
An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://glftpd.io/ | Vendor Advisory | |
| cve@mitre.org | https://www.exploit-db.com/exploits/49773 | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://glftpd.io/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/49773 | Exploit, Third Party Advisory, VDB Entry |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.11a:*:*:*:*:*:*:*",
"matchCriteriaId": "65B57240-2045-4118-9050-055BBC6E09C7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit."
},
{
"lang": "es",
"value": "Se ha detectado un problema en glFTPd versi\u00f3n 2.11a, que permite a atacantes remotos causar una denegaci\u00f3n de servicio por medio de la superaci\u00f3n del l\u00edmite de conexi\u00f3n"
}
],
"id": "CVE-2021-31645",
"lastModified": "2024-11-21T06:06:04.217",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-07-07T19:15:07.740",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://glftpd.io/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/49773"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://glftpd.io/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/49773"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-1253
Vulnerability from fkie_nvd - Published: 2006-03-19 01:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| glftpd | glftpd | 1.18 | |
| glftpd | glftpd | 1.19 | |
| glftpd | glftpd | 1.20 | |
| glftpd | glftpd | 1.21 | |
| glftpd | glftpd | 1.22 | |
| glftpd | glftpd | 1.23 | |
| glftpd | glftpd | 1.24 | |
| glftpd | glftpd | 1.25 | |
| glftpd | glftpd | 1.26 | |
| glftpd | glftpd | 1.27 | |
| glftpd | glftpd | 1.28 | |
| glftpd | glftpd | 1.29 | |
| glftpd | glftpd | 1.29.1 | |
| glftpd | glftpd | 1.30 | |
| glftpd | glftpd | 1.31 | |
| glftpd | glftpd | 1.32 | |
| glftpd | glftpd | 2.0 | |
| glftpd | glftpd | 2.0_rc1 | |
| glftpd | glftpd | 2.0_rc2 | |
| glftpd | glftpd | 2.0_rc3 | |
| glftpd | glftpd | 2.0_rc4 | |
| glftpd | glftpd | 2.0_rc5 | |
| glftpd | glftpd | 2.0_rc6 | |
| glftpd | glftpd | 2.0_rc7 | |
| glftpd | glftpd | 2.01_rc1 | |
| glftpd | glftpd | 2.01_rc2 | |
| glftpd | glftpd | 2.01_rc3 | |
| glftpd | glftpd | 2.01_rc4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "4E50A926-D68F-4B1E-A009-0808611885B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "2EC24C84-A059-4F09-AE7D-1F077AE8F291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8C2E9C-2305-4DAD-8406-D5BFAFBBEEC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "93D1CB71-B47D-4683-8174-328676D31DC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "91C1CCAA-543B-45EA-ABA1-768CEC9B7B84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "FE1E9A9B-BD3E-4D6B-87F5-1A84ACE32115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "81FD5F55-1937-4063-B534-B04AD0C4DE18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "E99FE53F-F64C-486C-B36F-A987A00F0BFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "648069B8-DCAD-4E41-8721-64ED93CF5D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC92E29-F4C6-4529-B691-1B3C9621BECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.28:*:*:*:*:*:*:*",
"matchCriteriaId": "FA83D5D1-47A5-4173-9C03-3BBECB446CDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.29:*:*:*:*:*:*:*",
"matchCriteriaId": "B349E5EE-7190-4CC3-9015-10380DBC281F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.29.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6AE9464-A3D2-4CAE-90F2-E241FEE8D75F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "2AB9FE1C-742B-4EE5-93E1-FF74AF070E0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "B2CA4FD5-451F-4657-B494-F48DA6D933E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "6C626C28-742B-4F6D-94E0-56B445260522",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5F0131D-0E50-433A-ABEB-3B0062BFDC9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "11FFFE55-070E-45B1-889D-0F81EAA1E213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "2931F258-AECE-4181-905A-D8801E12721B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc3:*:*:*:*:*:*:*",
"matchCriteriaId": "28D773FC-D4D3-495D-BDE0-155B896D1B7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc4:*:*:*:*:*:*:*",
"matchCriteriaId": "A0D405B1-8AF9-46A5-AFB0-628F067D8D73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc5:*:*:*:*:*:*:*",
"matchCriteriaId": "CAED5165-E96B-45BD-9C93-A365C6569E13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc6:*:*:*:*:*:*:*",
"matchCriteriaId": "8215195F-1FE1-4F3C-A067-E69F177E58B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc7:*:*:*:*:*:*:*",
"matchCriteriaId": "B05E032C-B32F-4AD6-B226-9E49CCD5D44F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.01_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "17585572-DF7D-44A6-87EE-2FE7760AEBE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.01_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "FC5604AF-E077-4195-BF64-1855638C923F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.01_rc3:*:*:*:*:*:*:*",
"matchCriteriaId": "43D93E21-AC66-4D9C-9154-4698272F8268",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.01_rc4:*:*:*:*:*:*:*",
"matchCriteriaId": "0D17CAEF-2E71-4D51-8A92-500A3B147242",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address."
}
],
"id": "CVE-2006-1253",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-03-19T01:02:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/19221"
},
{
"source": "cve@mitre.org",
"tags": [
"URL Repurposed"
],
"url": "http://www.glftpd.com/files/docs/changelog"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/17118"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/19221"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"URL Repurposed"
],
"url": "http://www.glftpd.com/files/docs/changelog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/17118"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-0483
Vulnerability from fkie_nvd - Published: 2005-03-30 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing ("*") characters in a SITE NFO command.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.securityfocus.com/archive/1/390924 | Exploit, Vendor Advisory | |
| cve@mitre.org | http://www.securityfocus.com/bid/12586 | Exploit, Vendor Advisory | |
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/19401 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/390924 | Exploit, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/12586 | Exploit, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/19401 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| glftpd | glftpd | 1.26 | |
| glftpd | glftpd | 1.27 | |
| glftpd | glftpd | 1.28 | |
| glftpd | glftpd | 1.29.1 | |
| glftpd | glftpd | 1.31 | |
| glftpd | glftpd | 1.32 | |
| glftpd | glftpd | 2.0 | |
| glftpd | glftpd | 2.0_rc1 | |
| glftpd | glftpd | 2.0_rc2 | |
| glftpd | glftpd | 2.0_rc3 | |
| glftpd | glftpd | 2.0_rc4 | |
| glftpd | glftpd | 2.0_rc5 | |
| glftpd | glftpd | 2.0_rc6 | |
| glftpd | glftpd | 2.0_rc7 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "648069B8-DCAD-4E41-8721-64ED93CF5D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC92E29-F4C6-4529-B691-1B3C9621BECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.28:*:*:*:*:*:*:*",
"matchCriteriaId": "FA83D5D1-47A5-4173-9C03-3BBECB446CDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.29.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6AE9464-A3D2-4CAE-90F2-E241FEE8D75F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "B2CA4FD5-451F-4657-B494-F48DA6D933E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "6C626C28-742B-4F6D-94E0-56B445260522",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5F0131D-0E50-433A-ABEB-3B0062BFDC9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "11FFFE55-070E-45B1-889D-0F81EAA1E213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "2931F258-AECE-4181-905A-D8801E12721B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc3:*:*:*:*:*:*:*",
"matchCriteriaId": "28D773FC-D4D3-495D-BDE0-155B896D1B7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc4:*:*:*:*:*:*:*",
"matchCriteriaId": "A0D405B1-8AF9-46A5-AFB0-628F067D8D73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc5:*:*:*:*:*:*:*",
"matchCriteriaId": "CAED5165-E96B-45BD-9C93-A365C6569E13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc6:*:*:*:*:*:*:*",
"matchCriteriaId": "8215195F-1FE1-4F3C-A067-E69F177E58B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:2.0_rc7:*:*:*:*:*:*:*",
"matchCriteriaId": "B05E032C-B32F-4AD6-B226-9E49CCD5D44F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing (\"*\") characters in a SITE NFO command."
},
{
"lang": "es",
"value": "M\u00faltiple atravesamiento de directorios en sitenfo.sh, sitezipchk.sh y siteziplist.sh en Glftpd de la versi\u00f3n 1.26 a la 2.00 permite a usuarios autenticados remotamente:\r\n\r\ndeterminar la existencia de ficheros arbitrarios,\r\nlistar los ficheros incluidos en directorios restringidos,\r\nleer ficheros arbitrarios de archivos ZIP o gzip, mediante; secuencias .. (punto punto) y caracteres (\"\"*\"\") en el comando SITE NFO."
}
],
"id": "CVE-2005-0483",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-03-30T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/archive/1/390924"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/12586"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/archive/1/390924"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/12586"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2001-0965
Vulnerability from fkie_nvd - Published: 2001-08-31 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html | Exploit, Patch, Vendor Advisory | |
| cve@mitre.org | http://www.glftpd.org/ | Vendor Advisory | |
| cve@mitre.org | http://www.iss.net/security_center/static/7001.php | ||
| cve@mitre.org | http://www.securityfocus.com/bid/3201 | Exploit, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html | Exploit, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.glftpd.org/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/7001.php | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/3201 | Exploit, Patch, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.13.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F318FEBE-E9EE-4DD2-881C-61E5FE05AAF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.16.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AADA6033-2154-455E-8E10-761E777549E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "06212998-AE09-4DA2-9F9C-EBB60BBD7EBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.18a:*:*:*:*:*:*:*",
"matchCriteriaId": "834771A5-87B0-41E5-A93C-6A1343726E49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "2EC24C84-A059-4F09-AE7D-1F077AE8F291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8C2E9C-2305-4DAD-8406-D5BFAFBBEEC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "93D1CB71-B47D-4683-8174-328676D31DC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.22b:*:*:*:*:*:*:*",
"matchCriteriaId": "431B7EC0-0471-4F31-A26C-F59B541DCD09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "FE1E9A9B-BD3E-4D6B-87F5-1A84ACE32115",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters."
}
],
"id": "CVE-2001-0965",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2001-08-31T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.glftpd.org/"
},
{
"source": "cve@mitre.org",
"url": "http://www.iss.net/security_center/static/7001.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/3201"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.glftpd.org/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.iss.net/security_center/static/7001.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/3201"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2000-0587
Vulnerability from fkie_nvd - Published: 2000-06-26 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "4E50A926-D68F-4B1E-A009-0808611885B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "2EC24C84-A059-4F09-AE7D-1F077AE8F291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8C2E9C-2305-4DAD-8406-D5BFAFBBEEC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.21b1:*:*:*:*:*:*:*",
"matchCriteriaId": "CF143A96-B3A2-4876-8B50-C583B891752D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.21b2:*:*:*:*:*:*:*",
"matchCriteriaId": "3031BA2A-5FEC-425E-AA1E-DA39FD9CF94E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.21b3:*:*:*:*:*:*:*",
"matchCriteriaId": "6A877D2D-854A-4614-931B-BC42E70CEE8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.21b4:*:*:*:*:*:*:*",
"matchCriteriaId": "070A2213-B877-42DE-9112-7A90E13778C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.21b5:*:*:*:*:*:*:*",
"matchCriteriaId": "53DC7530-D9CC-4E1B-A96D-505CE0005192",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.21b6:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAF880E-B556-465A-8CB8-47196EF0D9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.21b7:*:*:*:*:*:*:*",
"matchCriteriaId": "34704098-AD9F-405B-AB35-923546A8B7D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.21b8:*:*:*:*:*:*:*",
"matchCriteriaId": "33E8DEBD-42E4-4EBF-87BF-7F620584BA9B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability."
}
],
"id": "CVE-2000-0587",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2000-06-26T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/1401"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000%40twix.thrijswijk.nl"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/1401"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000%40twix.thrijswijk.nl"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2000-0040
Vulnerability from fkie_nvd - Published: 1999-12-23 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:glftpd:glftpd:1.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "06212998-AE09-4DA2-9F9C-EBB60BBD7EBB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command."
}
],
"id": "CVE-2000-0040",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "1999-12-23T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2000-0038
Vulnerability from fkie_nvd - Published: 1999-12-23 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
glFtpD includes a default glftpd user account with a default password and a UID of 0.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:glftpd:glftpd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3E9A6FF-24D4-4900-8112-B18679318534",
"versionEndIncluding": "1.17.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "glFtpD includes a default glftpd user account with a default password and a UID of 0."
}
],
"id": "CVE-2000-0038",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "1999-12-23T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2021-31645 (GCVE-0-2021-31645)
Vulnerability from cvelistv5 – Published: 2022-07-07 18:42 – Updated: 2024-08-03 23:03
VLAI?
Summary
An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T23:03:33.666Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://glftpd.io/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/49773"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-07-07T18:42:40",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://glftpd.io/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.exploit-db.com/exploits/49773"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-31645",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://glftpd.io/",
"refsource": "MISC",
"url": "https://glftpd.io/"
},
{
"name": "https://www.exploit-db.com/exploits/49773",
"refsource": "MISC",
"url": "https://www.exploit-db.com/exploits/49773"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-31645",
"datePublished": "2022-07-07T18:42:40",
"dateReserved": "2021-04-23T00:00:00",
"dateUpdated": "2024-08-03T23:03:33.666Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-1253 (GCVE-0-2006-1253)
Vulnerability from cvelistv5 – Published: 2006-03-19 01:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T17:03:28.748Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "17118",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/17118"
},
{
"name": "19221",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19221"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.glftpd.com/files/docs/changelog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-03-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2006-03-25T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "17118",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/17118"
},
{
"name": "19221",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19221"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.glftpd.com/files/docs/changelog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-1253",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "17118",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17118"
},
{
"name": "19221",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19221"
},
{
"name": "http://www.glftpd.com/files/docs/changelog",
"refsource": "CONFIRM",
"url": "http://www.glftpd.com/files/docs/changelog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-1253",
"datePublished": "2006-03-19T01:00:00",
"dateReserved": "2006-03-18T00:00:00",
"dateUpdated": "2024-08-07T17:03:28.748Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-0483 (GCVE-0-2005-0483)
Vulnerability from cvelistv5 – Published: 2005-02-19 05:00 – Updated: 2024-08-07 21:13
VLAI?
Summary
Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing ("*") characters in a SITE NFO command.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T21:13:54.238Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20050218 Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/390924"
},
{
"name": "glftpd-sitenfosh-directory-traversal(19401)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
},
{
"name": "12586",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/12586"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-02-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing (\"*\") characters in a SITE NFO command."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20050218 Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/390924"
},
{
"name": "glftpd-sitenfosh-directory-traversal(19401)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
},
{
"name": "12586",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/12586"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-0483",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing (\"*\") characters in a SITE NFO command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20050218 Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/390924"
},
{
"name": "glftpd-sitenfosh-directory-traversal(19401)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
},
{
"name": "12586",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12586"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-0483",
"datePublished": "2005-02-19T05:00:00",
"dateReserved": "2005-02-19T00:00:00",
"dateUpdated": "2024-08-07T21:13:54.238Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2001-0965 (GCVE-0-2001-0965)
Vulnerability from cvelistv5 – Published: 2002-03-09 05:00 – Updated: 2024-08-08 04:37
VLAI?
Summary
glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:37:07.293Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "3201",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/3201"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.glftpd.org/"
},
{
"name": "glftpd-list-dos(7001)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/7001.php"
},
{
"name": "20010817 [ASGUARD-LABS] glFTPD v1.23 DOS Attack",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2001-08-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-02-28T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "3201",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/3201"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.glftpd.org/"
},
{
"name": "glftpd-list-dos(7001)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/7001.php"
},
{
"name": "20010817 [ASGUARD-LABS] glFTPD v1.23 DOS Attack",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2001-0965",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "3201",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3201"
},
{
"name": "http://www.glftpd.org/",
"refsource": "CONFIRM",
"url": "http://www.glftpd.org/"
},
{
"name": "glftpd-list-dos(7001)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7001.php"
},
{
"name": "20010817 [ASGUARD-LABS] glFTPD v1.23 DOS Attack",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2001-0965",
"datePublished": "2002-03-09T05:00:00",
"dateReserved": "2002-01-31T00:00:00",
"dateUpdated": "2024-08-08T04:37:07.293Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2000-0587 (GCVE-0-2000-0587)
Vulnerability from cvelistv5 – Published: 2000-10-13 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T05:21:31.318Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1401",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/1401"
},
{
"name": "20000626 Glftpd privpath bugs... +fix",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000%40twix.thrijswijk.nl"
},
{
"name": "20000627 Re: Glftpd privpath bugs... +fix",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2000-06-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-11-02T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1401",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/1401"
},
{
"name": "20000626 Glftpd privpath bugs... +fix",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000%40twix.thrijswijk.nl"
},
{
"name": "20000627 Re: Glftpd privpath bugs... +fix",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0587",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1401",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1401"
},
{
"name": "20000626 Glftpd privpath bugs... +fix",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000@twix.thrijswijk.nl"
},
{
"name": "20000627 Re: Glftpd privpath bugs... +fix",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0587",
"datePublished": "2000-10-13T04:00:00",
"dateReserved": "2000-07-19T00:00:00",
"dateUpdated": "2024-08-08T05:21:31.318Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2000-0040 (GCVE-0-2000-0040)
Vulnerability from cvelistv5 – Published: 2000-03-22 05:00 – Updated: 2024-08-08 05:05
VLAI?
Summary
glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T05:05:52.944Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "1999-12-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-17T08:19:53",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0040",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0040",
"datePublished": "2000-03-22T05:00:00",
"dateReserved": "2000-01-11T00:00:00",
"dateUpdated": "2024-08-08T05:05:52.944Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2000-0038 (GCVE-0-2000-0038)
Vulnerability from cvelistv5 – Published: 2000-02-04 05:00 – Updated: 2024-08-08 05:05
VLAI?
Summary
glFtpD includes a default glftpd user account with a default password and a UID of 0.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T05:05:53.654Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "1999-12-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "glFtpD includes a default glftpd user account with a default password and a UID of 0."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-17T08:19:45",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0038",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "glFtpD includes a default glftpd user account with a default password and a UID of 0."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0038",
"datePublished": "2000-02-04T05:00:00",
"dateReserved": "2000-01-11T00:00:00",
"dateUpdated": "2024-08-08T05:05:53.654Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-31645 (GCVE-0-2021-31645)
Vulnerability from nvd – Published: 2022-07-07 18:42 – Updated: 2024-08-03 23:03
VLAI?
Summary
An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T23:03:33.666Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://glftpd.io/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/49773"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-07-07T18:42:40",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://glftpd.io/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.exploit-db.com/exploits/49773"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-31645",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in glFTPd 2.11a that allows remote attackers to cause a denial of service via exceeding the connection limit."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://glftpd.io/",
"refsource": "MISC",
"url": "https://glftpd.io/"
},
{
"name": "https://www.exploit-db.com/exploits/49773",
"refsource": "MISC",
"url": "https://www.exploit-db.com/exploits/49773"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-31645",
"datePublished": "2022-07-07T18:42:40",
"dateReserved": "2021-04-23T00:00:00",
"dateUpdated": "2024-08-03T23:03:33.666Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-1253 (GCVE-0-2006-1253)
Vulnerability from nvd – Published: 2006-03-19 01:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T17:03:28.748Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "17118",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/17118"
},
{
"name": "19221",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19221"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.glftpd.com/files/docs/changelog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-03-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2006-03-25T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "17118",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/17118"
},
{
"name": "19221",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19221"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.glftpd.com/files/docs/changelog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-1253",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "17118",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17118"
},
{
"name": "19221",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19221"
},
{
"name": "http://www.glftpd.com/files/docs/changelog",
"refsource": "CONFIRM",
"url": "http://www.glftpd.com/files/docs/changelog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-1253",
"datePublished": "2006-03-19T01:00:00",
"dateReserved": "2006-03-18T00:00:00",
"dateUpdated": "2024-08-07T17:03:28.748Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-0483 (GCVE-0-2005-0483)
Vulnerability from nvd – Published: 2005-02-19 05:00 – Updated: 2024-08-07 21:13
VLAI?
Summary
Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing ("*") characters in a SITE NFO command.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T21:13:54.238Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20050218 Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/390924"
},
{
"name": "glftpd-sitenfosh-directory-traversal(19401)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
},
{
"name": "12586",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/12586"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-02-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing (\"*\") characters in a SITE NFO command."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20050218 Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/390924"
},
{
"name": "glftpd-sitenfosh-directory-traversal(19401)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
},
{
"name": "12586",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/12586"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-0483",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing (\"*\") characters in a SITE NFO command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20050218 Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/390924"
},
{
"name": "glftpd-sitenfosh-directory-traversal(19401)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19401"
},
{
"name": "12586",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12586"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-0483",
"datePublished": "2005-02-19T05:00:00",
"dateReserved": "2005-02-19T00:00:00",
"dateUpdated": "2024-08-07T21:13:54.238Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2001-0965 (GCVE-0-2001-0965)
Vulnerability from nvd – Published: 2002-03-09 05:00 – Updated: 2024-08-08 04:37
VLAI?
Summary
glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:37:07.293Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "3201",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/3201"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.glftpd.org/"
},
{
"name": "glftpd-list-dos(7001)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/7001.php"
},
{
"name": "20010817 [ASGUARD-LABS] glFTPD v1.23 DOS Attack",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2001-08-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-02-28T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "3201",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/3201"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.glftpd.org/"
},
{
"name": "glftpd-list-dos(7001)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/7001.php"
},
{
"name": "20010817 [ASGUARD-LABS] glFTPD v1.23 DOS Attack",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2001-0965",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "glFTPD 1.23 allows remote attackers to cause a denial of service (CPU consumption) via a LIST command with an argument that contains a large number of * (asterisk) characters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "3201",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3201"
},
{
"name": "http://www.glftpd.org/",
"refsource": "CONFIRM",
"url": "http://www.glftpd.org/"
},
{
"name": "glftpd-list-dos(7001)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7001.php"
},
{
"name": "20010817 [ASGUARD-LABS] glFTPD v1.23 DOS Attack",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0239.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2001-0965",
"datePublished": "2002-03-09T05:00:00",
"dateReserved": "2002-01-31T00:00:00",
"dateUpdated": "2024-08-08T04:37:07.293Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2000-0587 (GCVE-0-2000-0587)
Vulnerability from nvd – Published: 2000-10-13 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T05:21:31.318Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1401",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/1401"
},
{
"name": "20000626 Glftpd privpath bugs... +fix",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000%40twix.thrijswijk.nl"
},
{
"name": "20000627 Re: Glftpd privpath bugs... +fix",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2000-06-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-11-02T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1401",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/1401"
},
{
"name": "20000626 Glftpd privpath bugs... +fix",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000%40twix.thrijswijk.nl"
},
{
"name": "20000627 Re: Glftpd privpath bugs... +fix",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0587",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The privpath directive in glftpd 1.18 allows remote attackers to bypass access restrictions for directories by using the file name completion capability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1401",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1401"
},
{
"name": "20000626 Glftpd privpath bugs... +fix",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=Pine.LNX.4.10.10006261041360.31907-200000@twix.thrijswijk.nl"
},
{
"name": "20000627 Re: Glftpd privpath bugs... +fix",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-06/0317.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0587",
"datePublished": "2000-10-13T04:00:00",
"dateReserved": "2000-07-19T00:00:00",
"dateUpdated": "2024-08-08T05:21:31.318Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2000-0040 (GCVE-0-2000-0040)
Vulnerability from nvd – Published: 2000-03-22 05:00 – Updated: 2024-08-08 05:05
VLAI?
Summary
glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T05:05:52.944Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "1999-12-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-17T08:19:53",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0040",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0040",
"datePublished": "2000-03-22T05:00:00",
"dateReserved": "2000-01-11T00:00:00",
"dateUpdated": "2024-08-08T05:05:52.944Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2000-0038 (GCVE-0-2000-0038)
Vulnerability from nvd – Published: 2000-02-04 05:00 – Updated: 2024-08-08 05:05
VLAI?
Summary
glFtpD includes a default glftpd user account with a default password and a UID of 0.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T05:05:53.654Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "1999-12-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "glFtpD includes a default glftpd user account with a default password and a UID of 0."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-17T08:19:45",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0038",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "glFtpD includes a default glftpd user account with a default password and a UID of 0."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0038",
"datePublished": "2000-02-04T05:00:00",
"dateReserved": "2000-01-11T00:00:00",
"dateUpdated": "2024-08-08T05:05:53.654Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}