Vulnerabilites related to FileZilla - FileZilla
CVE-2006-6564 (GCVE-0-2006-6564)
Vulnerability from cvelistv5
Published
2006-12-15 11:00
Modified
2024-08-07 20:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
FileZilla Server before 0.9.22 allows remote attackers to cause a denial of service (crash) via a malformed argument to the STOR command, which results in a NULL pointer dereference. NOTE: CVE analysis suggests that the problem might be due to a malformed PORT command.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:33:59.629Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "filezilla-commands-dos(30853)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30853" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=470364\u0026group_id=21558" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://retrogod.altervista.org/filezilla_0921_dos.html" }, { "name": "ADV-2006-4937", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4937" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "FileZilla Server before 0.9.22 allows remote attackers to cause a denial of service (crash) via a malformed argument to the STOR command, which results in a NULL pointer dereference. NOTE: CVE analysis suggests that the problem might be due to a malformed PORT command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "filezilla-commands-dos(30853)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30853" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=470364\u0026group_id=21558" }, { "tags": [ "x_refsource_MISC" ], "url": "http://retrogod.altervista.org/filezilla_0921_dos.html" }, { "name": "ADV-2006-4937", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4937" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-6564", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FileZilla Server before 0.9.22 allows remote attackers to cause a denial of service (crash) via a malformed argument to the STOR command, which results in a NULL pointer dereference. NOTE: CVE analysis suggests that the problem might be due to a malformed PORT command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "filezilla-commands-dos(30853)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30853" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=470364\u0026group_id=21558", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=470364\u0026group_id=21558" }, { "name": "http://retrogod.altervista.org/filezilla_0921_dos.html", "refsource": "MISC", "url": "http://retrogod.altervista.org/filezilla_0921_dos.html" }, { "name": "ADV-2006-4937", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4937" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-6564", "datePublished": "2006-12-15T11:00:00", "dateReserved": "2006-12-14T00:00:00", "dateUpdated": "2024-08-07T20:33:59.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-2318 (GCVE-0-2007-2318)
Vulnerability from cvelistv5
Published
2007-04-26 21:00
Modified
2024-08-07 13:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple format string vulnerabilities in FileZilla before 2.2.32 allow remote attackers to execute arbitrary code via format string specifiers in (1) FTP server responses or (2) data sent by an FTP server. NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:33:28.385Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34437", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/34437" }, { "name": "23506", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23506" }, { "name": "24894", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24894" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=501534\u0026group_id=21558" }, { "name": "34436", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/34436" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple format string vulnerabilities in FileZilla before 2.2.32 allow remote attackers to execute arbitrary code via format string specifiers in (1) FTP server responses or (2) data sent by an FTP server. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-13T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34437", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/34437" }, { "name": "23506", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23506" }, { "name": "24894", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24894" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=501534\u0026group_id=21558" }, { "name": "34436", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/34436" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2318", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple format string vulnerabilities in FileZilla before 2.2.32 allow remote attackers to execute arbitrary code via format string specifiers in (1) FTP server responses or (2) data sent by an FTP server. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34437", "refsource": "OSVDB", "url": "http://osvdb.org/34437" }, { "name": "23506", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23506" }, { "name": "24894", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24894" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=501534\u0026group_id=21558", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=501534\u0026group_id=21558" }, { "name": "34436", "refsource": "OSVDB", "url": "http://osvdb.org/34436" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2318", "datePublished": "2007-04-26T21:00:00", "dateReserved": "2007-04-26T00:00:00", "dateUpdated": "2024-08-07T13:33:28.385Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2898 (GCVE-0-2005-2898)
Vulnerability from cvelistv5
Published
2005-09-14 04:00
Modified
2024-08-07 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
NOTE: this issue has been disputed by the vendor. FileZilla 2.2.14b and 2.2.15, and possibly earlier versions, when "Use secure mode" is disabled, uses a weak encryption scheme to store the user's password in the configuration settings file, which allows local users to obtain sensitive information. NOTE: the vendor has disputed the issue, stating that "the problem is not a vulnerability at all, but in fact a fundamental issue of every single program that can store passwords transparently.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:53:30.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://filezilla.sourceforge.net/forum/viewtopic.php?t=1328" }, { "name": "filezilla-password-weak-encryption(22135)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22135" }, { "name": "14730", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14730" }, { "name": "20050902 FileZilla weakly-encrypted password vulnerability: advisory + PoC", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112577523810442\u0026w=2" }, { "name": "20050904 Re: FileZilla weakly-encrypted password vulnerability: advisory + PoC", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112605448327521\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-09-02T00:00:00", "descriptions": [ { "lang": "en", "value": "NOTE: this issue has been disputed by the vendor. FileZilla 2.2.14b and 2.2.15, and possibly earlier versions, when \"Use secure mode\" is disabled, uses a weak encryption scheme to store the user\u0027s password in the configuration settings file, which allows local users to obtain sensitive information. NOTE: the vendor has disputed the issue, stating that \"the problem is not a vulnerability at all, but in fact a fundamental issue of every single program that can store passwords transparently." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-11T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://filezilla.sourceforge.net/forum/viewtopic.php?t=1328" }, { "name": "filezilla-password-weak-encryption(22135)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22135" }, { "name": "14730", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14730" }, { "name": "20050902 FileZilla weakly-encrypted password vulnerability: advisory + PoC", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112577523810442\u0026w=2" }, { "name": "20050904 Re: FileZilla weakly-encrypted password vulnerability: advisory + PoC", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112605448327521\u0026w=2" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2898", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** NOTE: this issue has been disputed by the vendor. FileZilla 2.2.14b and 2.2.15, and possibly earlier versions, when \"Use secure mode\" is disabled, uses a weak encryption scheme to store the user\u0027s password in the configuration settings file, which allows local users to obtain sensitive information. NOTE: the vendor has disputed the issue, stating that \"the problem is not a vulnerability at all, but in fact a fundamental issue of every single program that can store passwords transparently.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://filezilla.sourceforge.net/forum/viewtopic.php?t=1328", "refsource": "MISC", "url": "http://filezilla.sourceforge.net/forum/viewtopic.php?t=1328" }, { "name": "filezilla-password-weak-encryption(22135)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22135" }, { "name": "14730", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14730" }, { "name": "20050902 FileZilla weakly-encrypted password vulnerability: advisory + PoC", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112577523810442\u0026w=2" }, { "name": "20050904 Re: FileZilla weakly-encrypted password vulnerability: advisory + PoC", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112605448327521\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2898", "datePublished": "2005-09-14T04:00:00", "dateReserved": "2005-09-14T00:00:00", "dateUpdated": "2024-08-07T22:53:30.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-5429 (GCVE-0-2019-5429)
Vulnerability from cvelistv5
Published
2019-04-29 14:13
Modified
2024-08-04 19:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-426 - Untrusted Search Path ()
Summary
Untrusted search path in FileZilla before 3.41.0-rc1 allows an attacker to gain privileges via a malicious 'fzsftp' binary in the user's home directory.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:54:53.465Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2019-14" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://svn.filezilla-project.org/filezilla?view=revision\u0026revision=9112" }, { "name": "FEDORA-2019-d109db9c8a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7WUJWTJA55ILACKLTJFSQUYEBHVYENL/" }, { "name": "GLSA-202007-51", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-51" }, { "name": "[debian-lts-announce] 20220526 [SECURITY] [DLA 3026-1] filezilla security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00037.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FileZilla", "vendor": "FileZilla", "versions": [ { "status": "affected", "version": "3.41.0-rc1" } ] } ], "descriptions": [ { "lang": "en", "value": "Untrusted search path in FileZilla before 3.41.0-rc1 allows an attacker to gain privileges via a malicious \u0027fzsftp\u0027 binary in the user\u0027s home directory." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "Untrusted Search Path (CWE-426)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-26T14:06:14", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/security/research/tra-2019-14" }, { "tags": [ "x_refsource_MISC" ], "url": "https://svn.filezilla-project.org/filezilla?view=revision\u0026revision=9112" }, { "name": "FEDORA-2019-d109db9c8a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7WUJWTJA55ILACKLTJFSQUYEBHVYENL/" }, { "name": "GLSA-202007-51", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202007-51" }, { "name": "[debian-lts-announce] 20220526 [SECURITY] [DLA 3026-1] filezilla security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00037.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2019-5429", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FileZilla", "version": { "version_data": [ { "version_value": "3.41.0-rc1" } ] } } ] }, "vendor_name": "FileZilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path in FileZilla before 3.41.0-rc1 allows an attacker to gain privileges via a malicious \u0027fzsftp\u0027 binary in the user\u0027s home directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Untrusted Search Path (CWE-426)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.tenable.com/security/research/tra-2019-14", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2019-14" }, { "name": "https://svn.filezilla-project.org/filezilla?view=revision\u0026revision=9112", "refsource": "MISC", "url": "https://svn.filezilla-project.org/filezilla?view=revision\u0026revision=9112" }, { "name": "FEDORA-2019-d109db9c8a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7WUJWTJA55ILACKLTJFSQUYEBHVYENL/" }, { "name": "GLSA-202007-51", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202007-51" }, { "name": "[debian-lts-announce] 20220526 [SECURITY] [DLA 3026-1] filezilla security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00037.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2019-5429", "datePublished": "2019-04-29T14:13:02", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:54:53.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-0315 (GCVE-0-2007-0315)
Vulnerability from cvelistv5
Published
2007-01-18 00:00
Modified
2024-08-07 12:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple buffer overflows in FileZilla before 2.2.30a allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors related to (1) Options.cpp when storing settings in the registry, and (2) the transfer queue (QueueCtrl.cpp). NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:12:17.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "22057", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22057" }, { "name": "filezilla-options-queuectrl-bo(31500)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31500" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=475423\u0026group_id=21558" }, { "name": "ADV-2007-0183", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0183" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in FileZilla before 2.2.30a allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors related to (1) Options.cpp when storing settings in the registry, and (2) the transfer queue (QueueCtrl.cpp). NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "22057", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22057" }, { "name": "filezilla-options-queuectrl-bo(31500)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31500" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=475423\u0026group_id=21558" }, { "name": "ADV-2007-0183", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0183" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0315", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in FileZilla before 2.2.30a allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors related to (1) Options.cpp when storing settings in the registry, and (2) the transfer queue (QueueCtrl.cpp). NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "22057", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22057" }, { "name": "filezilla-options-queuectrl-bo(31500)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31500" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=475423\u0026group_id=21558", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=475423\u0026group_id=21558" }, { "name": "ADV-2007-0183", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0183" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0315", "datePublished": "2007-01-18T00:00:00", "dateReserved": "2007-01-17T00:00:00", "dateUpdated": "2024-08-07T12:12:17.997Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-0317 (GCVE-0-2007-0317)
Vulnerability from cvelistv5
Published
2007-01-18 00:00
Modified
2024-08-07 12:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Format string vulnerability in the LogMessage function in FileZilla before 3.0.0-beta5 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted arguments. NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:12:18.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=477793\u0026group_id=21558" }, { "name": "22063", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22063" }, { "name": "ADV-2007-0182", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0182" }, { "name": "filezilla-logmessage-format-string(31497)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31497" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the LogMessage function in FileZilla before 3.0.0-beta5 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted arguments. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=477793\u0026group_id=21558" }, { "name": "22063", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22063" }, { "name": "ADV-2007-0182", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0182" }, { "name": "filezilla-logmessage-format-string(31497)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31497" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0317", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in the LogMessage function in FileZilla before 3.0.0-beta5 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted arguments. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sourceforge.net/project/shownotes.php?release_id=477793\u0026group_id=21558", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=477793\u0026group_id=21558" }, { "name": "22063", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22063" }, { "name": "ADV-2007-0182", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0182" }, { "name": "filezilla-logmessage-format-string(31497)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31497" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0317", "datePublished": "2007-01-18T00:00:00", "dateReserved": "2007-01-17T00:00:00", "dateUpdated": "2024-08-07T12:12:18.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-2403 (GCVE-0-2006-2403)
Vulnerability from cvelistv5
Published
2006-05-16 01:00
Modified
2024-08-07 17:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in FileZilla before 2.2.23 allows remote attackers to execute arbitrary commands via unknown attack vectors.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:51:04.303Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29970", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/29970" }, { "name": "ADV-2006-1795", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1795" }, { "name": "filezilla-ftp-bo(26450)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26450" }, { "name": "20086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20086" }, { "name": "17972", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17972" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=416790" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in FileZilla before 2.2.23 allows remote attackers to execute arbitrary commands via unknown attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29970", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/29970" }, { "name": "ADV-2006-1795", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1795" }, { "name": "filezilla-ftp-bo(26450)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26450" }, { "name": "20086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20086" }, { "name": "17972", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17972" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=416790" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-2403", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in FileZilla before 2.2.23 allows remote attackers to execute arbitrary commands via unknown attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29970", "refsource": "OSVDB", "url": "http://www.osvdb.org/29970" }, { "name": "ADV-2006-1795", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1795" }, { "name": "filezilla-ftp-bo(26450)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26450" }, { "name": "20086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20086" }, { "name": "17972", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17972" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=416790", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=416790" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-2403", "datePublished": "2006-05-16T01:00:00", "dateReserved": "2006-05-15T00:00:00", "dateUpdated": "2024-08-07T17:51:04.303Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2007-01-18 00:28
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple buffer overflows in FileZilla before 2.2.30a allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors related to (1) Options.cpp when storing settings in the registry, and (2) the transfer queue (QueueCtrl.cpp). NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
filezilla | filezilla | * | |
filezilla | filezilla | 0.9.20 | |
filezilla | filezilla | 0.9.21 | |
filezilla | filezilla | 0.9.22 | |
filezilla | filezilla | 2.2.15 | |
filezilla | filezilla | 2.2.22 | |
filezilla | filezilla | 2.2.23 | |
filezilla | filezilla | 2.2.24 | |
filezilla | filezilla | 2.2.25 | |
filezilla | filezilla | 2.2.26 | |
filezilla | filezilla | 2.2.26a | |
filezilla | filezilla | 2.2.27 | |
filezilla | filezilla | 2.2.28 | |
filezilla | filezilla | 2.2.29 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:filezilla:filezilla:*:*:*:*:*:*:*:*", "matchCriteriaId": "C67196B6-10FD-4A50-93FD-804704AE9980", "versionEndIncluding": "2.2.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:0.9.20:*:*:*:*:*:*:*", "matchCriteriaId": "7E2B2E7B-7382-435A-927A-C741807D26F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:0.9.21:*:*:*:*:*:*:*", "matchCriteriaId": "CAFFB48F-EA66-41BE-BC27-20246EA1F620", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:0.9.22:*:*:*:*:*:*:*", "matchCriteriaId": "58C8F086-2040-4866-9010-990D2D1548CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "3AC390AF-5CEB-4201-B719-3A1132CBC05C", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "CAE0841F-4D10-4E4B-A9E5-3A457C42EFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "1593910D-65A2-4909-83F9-696E3E48BB81", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "AD809934-E3DA-44FC-B927-11481379801A", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "A62BFFF0-5048-4010-8F18-FB426F1BAAB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "3E54A9FC-D5DB-423E-9512-EDF9529FD8A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.26a:*:*:*:*:*:*:*", "matchCriteriaId": "F5D3C4C2-AEB1-4D83-AE6F-D8F4DE2CD231", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D7E03-48F0-4CF5-AB02-EB57F978B01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "CE9CCE2B-A7F8-460D-8415-BBE21AF1DF75", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "6ECEB364-2691-4189-8504-A70009830759", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in FileZilla before 2.2.30a allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors related to (1) Options.cpp when storing settings in the registry, and (2) the transfer queue (QueueCtrl.cpp). NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en FileZilla versiones anteriores a 2.2.30a, permiten a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n) por medio de vectores no especificados relacionados con (1) el archivo Options.cpp cuando se almacenan configuraciones en el registro, y (2) la cola de transferencia (QueueCtrl.cpp). NOTA: algunos de estos detalles se obtienen de informaci\u00f3n de terceros." } ], "evaluatorSolution": "Failed exploit attempts may result in a application level denial-of-service condition.", "id": "CVE-2007-0315", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-01-18T00:28:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=475423\u0026group_id=21558" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/22057" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/0183" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=475423\u0026group_id=21558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/22057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/0183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31500" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-12-15 11:28
Modified
2025-04-09 00:30
Severity ?
Summary
FileZilla Server before 0.9.22 allows remote attackers to cause a denial of service (crash) via a malformed argument to the STOR command, which results in a NULL pointer dereference. NOTE: CVE analysis suggests that the problem might be due to a malformed PORT command.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:filezilla:filezilla:*:*:*:*:*:*:*:*", "matchCriteriaId": "9663D8A2-10D7-48B9-81D7-96BBC7CB0EFC", "versionEndIncluding": "0.9.21", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "FileZilla Server before 0.9.22 allows remote attackers to cause a denial of service (crash) via a malformed argument to the STOR command, which results in a NULL pointer dereference. NOTE: CVE analysis suggests that the problem might be due to a malformed PORT command." }, { "lang": "es", "value": "FileZilla Server anterior 0.9.22 permite a un atacante remoto provocar denegaci\u00f3n de servicio (caida) a trav\u00e9s de un argumento mal formado para el comando STOR, lo cual resulta en un puntero NULL no referenciado. NOTA: El an\u00e1lisis del CVE sugiere que el problema pudo ser debido a un comando PORT malformado." } ], "id": "CVE-2006-6564", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-15T11:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://retrogod.altervista.org/filezilla_0921_dos.html" }, { "source": "cve@mitre.org", "url": "http://sourceforge.net/project/shownotes.php?release_id=470364\u0026group_id=21558" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/4937" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30853" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://retrogod.altervista.org/filezilla_0921_dos.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/project/shownotes.php?release_id=470364\u0026group_id=21558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30853" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-01-18 00:28
Modified
2025-04-09 00:30
Severity ?
Summary
Format string vulnerability in the LogMessage function in FileZilla before 3.0.0-beta5 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted arguments. NOTE: some of these details are obtained from third party information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:filezilla:filezilla:*:*:*:*:*:*:*:*", "matchCriteriaId": "93D9AB3D-F5AF-46EA-9B7D-A5FAF67FC7AE", "versionEndIncluding": "3.0.0_beta4", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:3.0.0_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "3CA27067-E75E-4898-B0F3-16BBC232237A", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:3.0.0_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "08F505A0-4717-4922-AC4E-7B87D1E1AC1F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the LogMessage function in FileZilla before 3.0.0-beta5 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted arguments. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Vulnerabilidad en el formato de cadena en la funci\u00f3n LogMessage en el FileZilla anterior a 3.0.0-beta5 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante argumentos manipulados. NOTA: algunos de estos detalles se obtienen a partir de la informaci\u00f3n de terceros." } ], "id": "CVE-2007-0317", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-01-18T00:28:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=477793\u0026group_id=21558" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/22063" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0182" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=477793\u0026group_id=21558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/22063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31497" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-04-26 21:19
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple format string vulnerabilities in FileZilla before 2.2.32 allow remote attackers to execute arbitrary code via format string specifiers in (1) FTP server responses or (2) data sent by an FTP server. NOTE: some of these details are obtained from third party information.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:filezilla:filezilla:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA3E8431-3DD2-483A-8DB6-2F8F0A123755", "versionEndIncluding": "2.2.31", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple format string vulnerabilities in FileZilla before 2.2.32 allow remote attackers to execute arbitrary code via format string specifiers in (1) FTP server responses or (2) data sent by an FTP server. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de formato de cadena en FileZilla versiones anteriores a 2.2.32 permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante especificadores de formato de cadena en (1) Repuestas de servidor FTP \u00f3 (2) datos enviados por un servidor FTP.\r\nNOTA: algunos de estos detalles se han obtenido de informaci\u00f3n de terceros." } ], "id": "CVE-2007-2318", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-04-26T21:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/34436" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/34437" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/24894" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=501534\u0026group_id=21558" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/23506" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/34436" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/34437" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/24894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=501534\u0026group_id=21558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/23506" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-05-16 01:02
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in FileZilla before 2.2.23 allows remote attackers to execute arbitrary commands via unknown attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.14b:*:*:*:*:*:*:*", "matchCriteriaId": "3192F9E2-D38E-4563-B148-3F0B5C3FBB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "3AC390AF-5CEB-4201-B719-3A1132CBC05C", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "CAE0841F-4D10-4E4B-A9E5-3A457C42EFDF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in FileZilla before 2.2.23 allows remote attackers to execute arbitrary commands via unknown attack vectors." } ], "evaluatorSolution": "Failed exploit attempts will likely crash the application.\r\nThis vulnerability is addressed in the following product release:\r\nFileZilla, FileZilla, 2.2.23", "id": "CVE-2006-2403", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-05-16T01:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20086" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=416790" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/29970" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/17972" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1795" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=416790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/29970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/17972" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26450" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-09-14 20:03
Modified
2025-04-03 01:03
Severity ?
Summary
NOTE: this issue has been disputed by the vendor. FileZilla 2.2.14b and 2.2.15, and possibly earlier versions, when "Use secure mode" is disabled, uses a weak encryption scheme to store the user's password in the configuration settings file, which allows local users to obtain sensitive information. NOTE: the vendor has disputed the issue, stating that "the problem is not a vulnerability at all, but in fact a fundamental issue of every single program that can store passwords transparently.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.14b:*:*:*:*:*:*:*", "matchCriteriaId": "3192F9E2-D38E-4563-B148-3F0B5C3FBB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:filezilla:filezilla:2.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "3AC390AF-5CEB-4201-B719-3A1132CBC05C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "NOTE: this issue has been disputed by the vendor. FileZilla 2.2.14b and 2.2.15, and possibly earlier versions, when \"Use secure mode\" is disabled, uses a weak encryption scheme to store the user\u0027s password in the configuration settings file, which allows local users to obtain sensitive information. NOTE: the vendor has disputed the issue, stating that \"the problem is not a vulnerability at all, but in fact a fundamental issue of every single program that can store passwords transparently." } ], "id": "CVE-2005-2898", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-09-14T20:03:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://filezilla.sourceforge.net/forum/viewtopic.php?t=1328" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112577523810442\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112605448327521\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/14730" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://filezilla.sourceforge.net/forum/viewtopic.php?t=1328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112577523810442\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112605448327521\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/14730" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22135" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }