Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/filezilla@0?distro=trixie
Typedeb
Namespacedebian
Namefilezilla
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.0.0~beta2-3
Latest_non_vulnerable_version3.69.6-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3c23-m939-wycb
vulnerability_id VCID-3c23-m939-wycb
summary A vulnerability has been found in FileZilla Client 3.17.0.0 and classified as problematic. This vulnerability affects unknown code of the file C:\Program Files\FileZilla FTP Client\uninstall.exe of the component Installer. The manipulation leads to unquoted search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-15003
reference_id
reference_type
scores
0
value 0.00434
scoring_system epss
scoring_elements 0.62869
published_at 2026-04-21T12:55:00Z
1
value 0.00434
scoring_system epss
scoring_elements 0.62875
published_at 2026-04-11T12:55:00Z
2
value 0.00434
scoring_system epss
scoring_elements 0.62863
published_at 2026-04-12T12:55:00Z
3
value 0.00434
scoring_system epss
scoring_elements 0.62841
published_at 2026-04-13T12:55:00Z
4
value 0.00434
scoring_system epss
scoring_elements 0.62882
published_at 2026-04-16T12:55:00Z
5
value 0.00434
scoring_system epss
scoring_elements 0.62889
published_at 2026-04-18T12:55:00Z
6
value 0.00434
scoring_system epss
scoring_elements 0.62737
published_at 2026-04-01T12:55:00Z
7
value 0.00434
scoring_system epss
scoring_elements 0.62795
published_at 2026-04-02T12:55:00Z
8
value 0.00434
scoring_system epss
scoring_elements 0.62825
published_at 2026-04-04T12:55:00Z
9
value 0.00434
scoring_system epss
scoring_elements 0.62789
published_at 2026-04-07T12:55:00Z
10
value 0.00434
scoring_system epss
scoring_elements 0.6284
published_at 2026-04-08T12:55:00Z
11
value 0.00434
scoring_system epss
scoring_elements 0.62857
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-15003
1
reference_url https://www.exploit-db.com/exploits/39803/
reference_id 39803
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:05:18Z/
url https://www.exploit-db.com/exploits/39803/
2
reference_url https://vuldb.com/?id.97204
reference_id ?id.97204
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:05:18Z/
url https://vuldb.com/?id.97204
3
reference_url https://youtu.be/r06VwwJ9J4M
reference_id r06VwwJ9J4M
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:05:18Z/
url https://youtu.be/r06VwwJ9J4M
fixed_packages
0
url pkg:deb/debian/filezilla@0?distro=trixie
purl pkg:deb/debian/filezilla@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@0%3Fdistro=trixie
1
url pkg:deb/debian/filezilla@3.52.2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/filezilla@3.52.2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24cg-zw49-b3ab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.52.2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/filezilla@3.63.0-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/filezilla@3.63.0-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24cg-zw49-b3ab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.63.0-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/filezilla@3.68.1-1?distro=trixie
purl pkg:deb/debian/filezilla@3.68.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.68.1-1%3Fdistro=trixie
4
url pkg:deb/debian/filezilla@3.69.6-2?distro=trixie
purl pkg:deb/debian/filezilla@3.69.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.69.6-2%3Fdistro=trixie
aliases CVE-2016-15003
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3c23-m939-wycb
1
url VCID-9rmq-pj9r-3khj
vulnerability_id VCID-9rmq-pj9r-3khj
summary FileZilla Client 3.63.1 contains a DLL hijacking vulnerability that allows attackers to execute malicious code by placing a crafted TextShaping.dll in the application directory. Attackers can generate a reverse shell payload using msfvenom and replace the missing DLL to achieve remote code execution when the application launches.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53959
reference_id
reference_type
scores
0
value 0.00288
scoring_system epss
scoring_elements 0.52247
published_at 2026-04-11T12:55:00Z
1
value 0.00288
scoring_system epss
scoring_elements 0.52258
published_at 2026-04-18T12:55:00Z
2
value 0.00288
scoring_system epss
scoring_elements 0.52254
published_at 2026-04-16T12:55:00Z
3
value 0.00288
scoring_system epss
scoring_elements 0.52216
published_at 2026-04-13T12:55:00Z
4
value 0.00288
scoring_system epss
scoring_elements 0.52231
published_at 2026-04-12T12:55:00Z
5
value 0.00294
scoring_system epss
scoring_elements 0.52692
published_at 2026-04-02T12:55:00Z
6
value 0.00294
scoring_system epss
scoring_elements 0.52719
published_at 2026-04-04T12:55:00Z
7
value 0.00294
scoring_system epss
scoring_elements 0.52684
published_at 2026-04-07T12:55:00Z
8
value 0.00294
scoring_system epss
scoring_elements 0.52734
published_at 2026-04-08T12:55:00Z
9
value 0.00294
scoring_system epss
scoring_elements 0.52729
published_at 2026-04-09T12:55:00Z
10
value 0.00372
scoring_system epss
scoring_elements 0.58976
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53959
1
reference_url https://www.exploit-db.com/exploits/51267
reference_id 51267
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-19T21:28:39Z/
url https://www.exploit-db.com/exploits/51267
2
reference_url https://www.vulncheck.com/advisories/filezilla-client-dll-hijacking-via-missing-textshapingdll
reference_id filezilla-client-dll-hijacking-via-missing-textshapingdll
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-19T21:28:39Z/
url https://www.vulncheck.com/advisories/filezilla-client-dll-hijacking-via-missing-textshapingdll
3
reference_url https://filezilla-project.org/
reference_id filezilla-project.org
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-19T21:28:39Z/
url https://filezilla-project.org/
fixed_packages
0
url pkg:deb/debian/filezilla@0?distro=trixie
purl pkg:deb/debian/filezilla@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@0%3Fdistro=trixie
1
url pkg:deb/debian/filezilla@3.52.2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/filezilla@3.52.2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24cg-zw49-b3ab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.52.2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/filezilla@3.63.0-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/filezilla@3.63.0-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24cg-zw49-b3ab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.63.0-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/filezilla@3.68.1-1?distro=trixie
purl pkg:deb/debian/filezilla@3.68.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.68.1-1%3Fdistro=trixie
4
url pkg:deb/debian/filezilla@3.69.6-2?distro=trixie
purl pkg:deb/debian/filezilla@3.69.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.69.6-2%3Fdistro=trixie
aliases CVE-2023-53959
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9rmq-pj9r-3khj
2
url VCID-bdvq-4nsk-k7af
vulnerability_id VCID-bdvq-4nsk-k7af
summary Multiple buffer overflows in FileZilla before 2.2.30a allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors related to (1) Options.cpp when storing settings in the registry, and (2) the transfer queue (QueueCtrl.cpp). NOTE: some of these details are obtained from third party information.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0315
reference_id
reference_type
scores
0
value 0.02986
scoring_system epss
scoring_elements 0.86551
published_at 2026-04-21T12:55:00Z
1
value 0.02986
scoring_system epss
scoring_elements 0.86474
published_at 2026-04-01T12:55:00Z
2
value 0.02986
scoring_system epss
scoring_elements 0.86484
published_at 2026-04-02T12:55:00Z
3
value 0.02986
scoring_system epss
scoring_elements 0.86503
published_at 2026-04-04T12:55:00Z
4
value 0.02986
scoring_system epss
scoring_elements 0.86502
published_at 2026-04-07T12:55:00Z
5
value 0.02986
scoring_system epss
scoring_elements 0.86522
published_at 2026-04-08T12:55:00Z
6
value 0.02986
scoring_system epss
scoring_elements 0.86532
published_at 2026-04-09T12:55:00Z
7
value 0.02986
scoring_system epss
scoring_elements 0.86547
published_at 2026-04-11T12:55:00Z
8
value 0.02986
scoring_system epss
scoring_elements 0.86543
published_at 2026-04-12T12:55:00Z
9
value 0.02986
scoring_system epss
scoring_elements 0.86538
published_at 2026-04-13T12:55:00Z
10
value 0.02986
scoring_system epss
scoring_elements 0.86552
published_at 2026-04-16T12:55:00Z
11
value 0.02986
scoring_system epss
scoring_elements 0.86558
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0315
1
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31500
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31500
2
reference_url http://sourceforge.net/project/shownotes.php?release_id=475423&group_id=21558
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=475423&group_id=21558
3
reference_url http://www.securityfocus.com/bid/22057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22057
4
reference_url http://www.vupen.com/english/advisories/2007/0183
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0183
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:0.9.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:0.9.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:0.9.20:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:0.9.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:0.9.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:0.9.21:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:0.9.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:0.9.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:0.9.22:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.15:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.22:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.23:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.24:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.25:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.26:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.26a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.26a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.26a:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.27:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.28:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:filezilla:filezilla:2.2.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:filezilla:filezilla:2.2.29:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0315
reference_id CVE-2007-0315
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-0315
fixed_packages
0
url pkg:deb/debian/filezilla@0?distro=trixie
purl pkg:deb/debian/filezilla@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@0%3Fdistro=trixie
1
url pkg:deb/debian/filezilla@3.52.2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/filezilla@3.52.2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24cg-zw49-b3ab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.52.2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/filezilla@3.63.0-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/filezilla@3.63.0-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24cg-zw49-b3ab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.63.0-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/filezilla@3.68.1-1?distro=trixie
purl pkg:deb/debian/filezilla@3.68.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.68.1-1%3Fdistro=trixie
4
url pkg:deb/debian/filezilla@3.69.6-2?distro=trixie
purl pkg:deb/debian/filezilla@3.69.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.69.6-2%3Fdistro=trixie
aliases CVE-2007-0315
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdvq-4nsk-k7af
3
url VCID-tg3e-fgna-n7hz
vulnerability_id VCID-tg3e-fgna-n7hz
summary Buffer overflow in FileZilla before 2.2.23 allows remote attackers to execute arbitrary commands via unknown attack vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2403
reference_id
reference_type
scores
0
value 0.01154
scoring_system epss
scoring_elements 0.78468
published_at 2026-04-01T12:55:00Z
1
value 0.01154
scoring_system epss
scoring_elements 0.78474
published_at 2026-04-02T12:55:00Z
2
value 0.01154
scoring_system epss
scoring_elements 0.78505
published_at 2026-04-04T12:55:00Z
3
value 0.01154
scoring_system epss
scoring_elements 0.78488
published_at 2026-04-07T12:55:00Z
4
value 0.01154
scoring_system epss
scoring_elements 0.78515
published_at 2026-04-08T12:55:00Z
5
value 0.01154
scoring_system epss
scoring_elements 0.7852
published_at 2026-04-09T12:55:00Z
6
value 0.01154
scoring_system epss
scoring_elements 0.78545
published_at 2026-04-11T12:55:00Z
7
value 0.01154
scoring_system epss
scoring_elements 0.78527
published_at 2026-04-12T12:55:00Z
8
value 0.01154
scoring_system epss
scoring_elements 0.78519
published_at 2026-04-13T12:55:00Z
9
value 0.01154
scoring_system epss
scoring_elements 0.78547
published_at 2026-04-18T12:55:00Z
10
value 0.01154
scoring_system epss
scoring_elements 0.78544
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2403
fixed_packages
0
url pkg:deb/debian/filezilla@0?distro=trixie
purl pkg:deb/debian/filezilla@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@0%3Fdistro=trixie
1
url pkg:deb/debian/filezilla@3.52.2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/filezilla@3.52.2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24cg-zw49-b3ab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.52.2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/filezilla@3.63.0-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/filezilla@3.63.0-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24cg-zw49-b3ab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.63.0-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/filezilla@3.68.1-1?distro=trixie
purl pkg:deb/debian/filezilla@3.68.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.68.1-1%3Fdistro=trixie
4
url pkg:deb/debian/filezilla@3.69.6-2?distro=trixie
purl pkg:deb/debian/filezilla@3.69.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@3.69.6-2%3Fdistro=trixie
aliases CVE-2006-2403
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tg3e-fgna-n7hz
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/filezilla@0%3Fdistro=trixie