Unspecified vulnerability in glFTPd before 2.01 RC5 allows remote attackers to bypass IP checks via a crafted DNS hostname, possibly a hostname that appears to be an IP address.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Glftpd | Glftpd | 1.18 (including) | 1.18 (including) |
Glftpd | Glftpd | 1.19 (including) | 1.19 (including) |
Glftpd | Glftpd | 1.20 (including) | 1.20 (including) |
Glftpd | Glftpd | 1.21 (including) | 1.21 (including) |
Glftpd | Glftpd | 1.22 (including) | 1.22 (including) |
Glftpd | Glftpd | 1.23 (including) | 1.23 (including) |
Glftpd | Glftpd | 1.24 (including) | 1.24 (including) |
Glftpd | Glftpd | 1.25 (including) | 1.25 (including) |
Glftpd | Glftpd | 1.26 (including) | 1.26 (including) |
Glftpd | Glftpd | 1.27 (including) | 1.27 (including) |
Glftpd | Glftpd | 1.28 (including) | 1.28 (including) |
Glftpd | Glftpd | 1.29 (including) | 1.29 (including) |
Glftpd | Glftpd | 1.29.1 (including) | 1.29.1 (including) |
Glftpd | Glftpd | 1.30 (including) | 1.30 (including) |
Glftpd | Glftpd | 1.31 (including) | 1.31 (including) |
Glftpd | Glftpd | 1.32 (including) | 1.32 (including) |
Glftpd | Glftpd | 2.0 (including) | 2.0 (including) |
Glftpd | Glftpd | 2.0_rc1 (including) | 2.0_rc1 (including) |
Glftpd | Glftpd | 2.0_rc2 (including) | 2.0_rc2 (including) |
Glftpd | Glftpd | 2.0_rc3 (including) | 2.0_rc3 (including) |
Glftpd | Glftpd | 2.0_rc4 (including) | 2.0_rc4 (including) |
Glftpd | Glftpd | 2.0_rc5 (including) | 2.0_rc5 (including) |
Glftpd | Glftpd | 2.0_rc6 (including) | 2.0_rc6 (including) |
Glftpd | Glftpd | 2.0_rc7 (including) | 2.0_rc7 (including) |
Glftpd | Glftpd | 2.01_rc1 (including) | 2.01_rc1 (including) |
Glftpd | Glftpd | 2.01_rc2 (including) | 2.01_rc2 (including) |
Glftpd | Glftpd | 2.01_rc3 (including) | 2.01_rc3 (including) |
Glftpd | Glftpd | 2.01_rc4 (including) | 2.01_rc4 (including) |